The Ring of Defense

The Recipe of Ransomware


Listen Later

In this episode, Bill Carter discusses the 'recipe of ransomware' and discusses how the business of ransomware actually works, aligned with the 6-E's:
Establishing - setting up the framework
Embedding - gaining access and foothold
Evading - ensuring that all monitoring tools are blind to activity
Encrypting - hiding the data from the data owner/custodian
Exfiltrating - removing the data for malicious usage
Extorting - making bank, baby!

...more
View all episodesView all episodes
Download on the App Store

The Ring of DefenseBy Robin Johns and Bill Carter