Dead Internet Theory and Ransomware Negotiations

Dead Internet Theory and Ransomware Negotiations

Dead internet theory - let's talk about it.

What are the implications for cyber?

Several recent studies suggest that over half of all internet traffic is coming from non-human sources. Between you and me, that number is probably much higher.

Regardless, we can divide this up into good bots and bad bots.

Good bots are harmless and serve a lot of valuable functions, such as indexing websites - Googlebot, for example.?

Bad bots are the issue. They're used for malicious activities ranging from scalping to DDoS attacks. They can vary in complexity from an if-then kind of bot to ones designed to emulate human behaviour (only made worse by AI).?

So, what are some of the common threats and how do we combat them?

Bad bots used in API attacks: Implement rate limiting and behaviour analysis to detect and block unusual traffic patterns targeting APIs. Proactive monitoring is key to staying ahead.

Residential proxies (spoofing): Use advanced bot detection tools that can analyse behavioural anomalies and identify proxy traffic masking as legitimate users.

Account takeover via credential stuffing: Enforce phishing-resistant multi-factor authentication (MFA) and regularly monitor for leaked credentials to block automated login attempts before they succeed.

Stay safe out there folks.

Link to the original post here: https://www.dhirubhai.net/posts/evan-dumas_dead-internet-theory-lets-talk-about-it-activity-7282195488848670747-32eD?utm_source=share&utm_medium=member_desktop?



Ransomware negotiators - what's it like?

I came across a thread about the experiences of some veteran ransomware negotiators and pulled out some of the most interesting parts.

Threat actor ransomware operations are incredibly organized, with several different groups working together, even a team for the negotiations and a help desk for the payment-making process. Hackers treat the whole thing like a legitimate business.?

The negotiation process is a fact-finding mission. Negotiators try to find a file listing of the data taken, proof of actual files taken, proof they can decrypt sample files we send back to them, evidence of destruction (if the payment occurs), and how they compromised the environment. After all that, only then does the negotiation occur.

Re-extortion (a failure to hand over data after a payment is made) is more common with smaller, lesser-known threat actor groups. Larger, more infamous groups try to maintain a reputation of compliance so that the next company they extort is more likely to pay.

Ransomware isn't easy on any business, but I hope this sheds some light on the process.?

Link to the original post here: https://www.dhirubhai.net/posts/evan-dumas_ransomware-negotiators-whats-it-like-activity-7282924051143041026-64J9?utm_source=share&utm_medium=member_desktop

要查看或添加评论,请登录

Evan Dumas的更多文章

  • Stealer Logs and Have I Been Pwned?

    Stealer Logs and Have I Been Pwned?

    Have I Been Pwned is one of my favorite websites - it lets you check whether your personal data has been compromised…

  • The Kaspersky Saga continues!

    The Kaspersky Saga continues!

    Another one bites the dust. Australia has officially banned Kaspersky from all government systems, citing "unacceptable…

    2 条评论
  • Biggest Cybersecurity incident of all time

    Biggest Cybersecurity incident of all time

    We might be witnessing the largest cyber security incident in the history of the world. And it's not even a cool hacker…

    2 条评论
  • Constraints made DeepSeek succeed

    Constraints made DeepSeek succeed

    DeepSeek is stirring the pot and causing all kinds of trouble. Everyone is talking about how they are cheaper and use…

  • DeepSeek in DeepTrouble!

    DeepSeek in DeepTrouble!

    That didn't take long. It turns out that if your AI was cheaper to develop than its competition, you may have cut some…

    4 条评论
  • MasterCard and DNS typos

    MasterCard and DNS typos

    So, MasterCard had a little DNS error that no one noticed for years..

  • Cyber affects every business of every size

    Cyber affects every business of every size

    I came across a thread about a small business owner whose company was at threat, thanks to a small bot attack. AWS…

    2 条评论
  • Quantum Computers - Is it happening or not?

    Quantum Computers - Is it happening or not?

    “If you kind of said 15 years for very useful quantum computers, that would probably be on the early side. If you said…

    2 条评论
  • What do neuroscience & physics have to do with Sales?

    What do neuroscience & physics have to do with Sales?

    I used to be very proud of my memory. Then I adjusted to be proud of my recall and as I’ve gotten older I’ve learned…

    3 条评论
  • Fit Calls for Focus

    Fit Calls for Focus

    I had originally thought I could cover Fit Calls, Demoes, and Trickle/Nurture together as they are a potent 1,2,3 when…

社区洞察

其他会员也浏览了