Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:02):
Welcome to Siberian Here, technology and cybersecurity are made simple
for everyone. Whether you're a tech geek or just curious
about the digital world, we've got you covered. Each episode
we dive into the latest topics from technocratico dot it
and break them down so you can stay informed and protected.
Speaker 2 (00:23):
This is a.
Speaker 1 (00:23):
Siberian Media Miami production. Let's get into it.
Speaker 3 (00:28):
The scab and gulcious flame make us.
Speaker 4 (00:32):
A blood pad fame to love it to fuckings holess
see usselves.
Speaker 2 (00:42):
And remember this.
Speaker 3 (00:50):
Ever, get that like pit in your stomach feeling, you know,
and you see one of those problems with your package emails.
Today we're diving deep into why that notification, that tiny
little thing is actually a huge gd deal And it
all comes back to the well kind of scary world
of cybercrime. We're talking ransomware, yeah, but not the pay
(01:11):
up and it's all good kind of story. Oh no,
things are getting way more interesting, and by interesting I
mean kind of terrifying to be honest.
Speaker 4 (01:19):
Yeah, no, you're right, things are definitely shifting. I mean
we used to think of ransomware as just like oh
cash grab right, criminals hold your data hostage, you pay up,
get it back at the end, but now we're seeing
a new goal disruption, just pure chaos.
Speaker 3 (01:31):
See that's what freaks me out. But hold on, before
we go all doomsday on everyone, Let's do it quick.
Like ransomware one to one? What is it really and
how does it even work?
Speaker 2 (01:38):
Think of it like this.
Speaker 4 (01:40):
It's a digital break in. They lock you out of
all your data, your files, everything, and then just like
in the movies, they leave a ransom note instructions on
how to pay, usually with cryptocurrency because it's like untraceable,
you know.
Speaker 3 (01:52):
Right, those digital ransom notes. Speaking of wasn't there that
whole thing with Royal Mail recently? That one got me thinking,
because let's be real, who hasn't stressed over an online order? Right?
Speaker 2 (02:03):
Yeah?
Speaker 3 (02:03):
You get one email, You're like, is it coming? Is
it lost? It's like universal anxiety, Oh for sure.
Speaker 4 (02:09):
And that's exactly what makes those attacks so effective. That
one's a perfect example. Hackers pretended to be Royal Mail
sent out these super convincing phishing emails and they targeted
get this, both the US and the UK.
Speaker 3 (02:21):
WHOA, so they weren't messing around. Did people actually fall
for it?
Speaker 2 (02:24):
Sadly? Yeah?
Speaker 4 (02:26):
The emails had these PDFs, you know, those official looking documents,
and inside there were links to download what seemed like
totally harmless VIP files. They even us Dropbox to host them.
Drop Box, but people use that every day, right, It's
brilliant and a messed up way. They take these like
everyday tools we all use and bam hide malicious code inside.
(02:46):
So you download the ZP file, think nothing of it,
You open it, and that's when they encrypt all your data.
Speaker 2 (02:53):
Game over.
Speaker 3 (02:54):
Ugh, so they've got your data. They want a ransom. Classic,
but didn't that rail mail attack have a twis? Like,
even if you paid, it didn't matter. What was that about?
Speaker 4 (03:03):
That's the scary part. Even though there was a ransom,
they designed it to destroy everything anyway.
Speaker 3 (03:07):
So wait, you hand over the money and your files
are still gone. That's just like, what's the point. It
feels personal? You know.
Speaker 2 (03:13):
It's a seriously disturbing trend.
Speaker 4 (03:15):
And yeah, while that Royal mail attack was kind of
small potatoes, it's a sign of where things are going.
Speaker 2 (03:20):
It's not about a quick buck anymore.
Speaker 3 (03:22):
Okay, So if it's not about the money, then what's
the deal. What do they get out of causing all
this maym.
Speaker 2 (03:27):
That is the million dollar questions.
Speaker 4 (03:29):
One we're going to unpack right after this, because well
it might be even more unsettling than you think.
Speaker 3 (03:34):
So we've gone from pay up or lose your cat
photos too, we're trashing everything by If it's not about
the ransom, then what is the point you hit the nail.
Speaker 2 (03:43):
On the head. It's the million dollar question. But here's
the thing.
Speaker 4 (03:46):
It's kind of like, you know how everyone talks about
information warfare.
Speaker 2 (03:50):
Now, it's disturbing how well it lines up. Okay, so
think about the goals undermining trust in well everything, sewing chaos.
Speaker 4 (03:59):
That's powerful, especially now, and we're all like glued to
our screens.
Speaker 3 (04:04):
True, but that's kind of creepy when you put it
like that. So it's not just about getting our data,
it's about messing with our.
Speaker 2 (04:09):
Heads too, exactly.
Speaker 4 (04:11):
Imagine what if they hit a hospital or the power grid.
Suddenly it's not just about some files on a computer.
We're talking about people's safety, national security, even our whole
way of life relies on this stuff.
Speaker 3 (04:23):
Working man, Okay, so this isn't just some like tech
issue anymore. This is big picture stuff. Yeah, it's kind
of terrifying when you think about how fragile it all is.
But we're all like tiny little boats in a huge
digital ocean here. What can we even deal about any
of this?
Speaker 2 (04:38):
I hear you.
Speaker 4 (04:39):
It's easy to feel helpless, But it's like anything else, right,
You don't leave your front door wide open, right, You
take steps, even small ones, to protect yourself.
Speaker 2 (04:47):
The digital world is the same.
Speaker 3 (04:49):
So what are our digital locks and alarms? Then?
Speaker 2 (04:51):
Okay?
Speaker 4 (04:52):
Number one emails be suspicious anything unexpected, especially if it's
like urgent action required or about maca out you use. Yeah,
double check that center addresses it really from who it says?
Speaker 3 (05:04):
Oh, and hover over links too, right before you click.
I mean, yeah, I've totally almost fallen for that.
Speaker 4 (05:09):
Yeah, exactly. It's easy to miss. And this one's basic,
but man, people mess it up.
Speaker 2 (05:14):
Strong passwords, different ones for everything. I know.
Speaker 3 (05:18):
It's a pain, but it makes sense, right. It's like
that saying weakest link and all that. If one password
gets out, your whole life is right there.
Speaker 2 (05:24):
Exactly.
Speaker 4 (05:25):
And while we're at it, two factor authentication wherever you
can turn that on. Think of it like a bodyguard
for your account.
Speaker 3 (05:31):
In fact, that's where you need like a code from
your phone on top of your password.
Speaker 1 (05:35):
Right.
Speaker 4 (05:35):
Yeah, it's a little extra step, but man, it makes
a huge e difference if someone's trying to break in.
Speaker 2 (05:42):
The big thing to remember is cybersecurity.
Speaker 4 (05:45):
It's about getting ahead of the bad guys, not just
reacting after something bad happens.
Speaker 3 (05:49):
So being smart, not necessarily being like a tech genius.
I like that. So it's like they say, knowledge is power, right,
especially in the digital world. Being careful with emails, strong passwords,
that two factor thing. It all adds up totally.
Speaker 2 (06:03):
It's all about being proactive building those habits, and it's something.
Speaker 4 (06:06):
We all need to be thinking about more, especially well
given what we're talking about here.
Speaker 3 (06:10):
Right, this whole idea that it's not just about stealing
data anymore, it's about messing things up right, disrupting everything exactly.
Speaker 4 (06:17):
And if something is honestly simple as ransomware can throw
businesses into chaos, imagine something bigger, more organized.
Speaker 3 (06:24):
Okay, now you're making me paranoid. And the thing is
everything's going digital, right, It's like we live in the
cloud now, So what happens then it feels like we're
I don't know, heading into some unknown territory.
Speaker 4 (06:36):
It is unknown territory in a lot of ways. And
that's why this conversation, as weird as it is to
think about this stuff, it's important.
Speaker 2 (06:43):
We got to understand why they're doing it, what could happen,
and what you e can do.
Speaker 3 (06:48):
Wow, So we started with your package's delayed email, and
now we're talking about like the fate of the Internet
and everything. That escalated quickly.
Speaker 2 (06:55):
It did, didn't it. But it just goes to show
this isn't just about gadgets, you know.
Speaker 4 (06:59):
It's about the whole old digital world we're building, how
we protect it, how we use it.
Speaker 2 (07:03):
It's a big deal.
Speaker 3 (07:03):
That's a good point to end on. I think, so listeners,
maybe go update those passwords, double check your settings, and yeah,
I think twice before you click that next urgent delivery link.
You never know. Thanks for joining us for this deep dive. Everyone,
catch you next time.
Speaker 2 (07:18):
Subsat longs full of salts.
Speaker 4 (07:22):
Who are you.
Speaker 3 (07:23):
Going to call?
Speaker 2 (07:28):
All reproduction rights are reserved by Siberium Media, Miami Production
and Technocratico dot It.
Speaker 3 (07:34):
For inquiries, you can reach us at podcast at Siberium
dot media.