Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Jack Rhysider

👤 Person
248 total appearances

Appearances Over Time

Podcast Appearances

Darknet Diaries
135: The D.R. Incident

Hmm. Sorry, I had a bad connection with Omar when we were talking. So let me repeat that for you. Omar worked in the CCERT for the Dominican Republic. CCERT is an acronym which stands for Cyber Security Incident Response Team. And this CCERT unit falls under the Department of Defense in the Dominican Republic. So when cyber attacks threaten national security, Omar was there to review it.

Darknet Diaries
135: The D.R. Incident

Hmm. Sorry, I had a bad connection with Omar when we were talking. So let me repeat that for you. Omar worked in the CCERT for the Dominican Republic. CCERT is an acronym which stands for Cyber Security Incident Response Team. And this CCERT unit falls under the Department of Defense in the Dominican Republic. So when cyber attacks threaten national security, Omar was there to review it.

Darknet Diaries
135: The D.R. Incident

But what's more is the Dominican Republic CCERT is part of a community of other incident response teams within Latin America.

Darknet Diaries
135: The D.R. Incident

But what's more is the Dominican Republic CCERT is part of a community of other incident response teams within Latin America.

Darknet Diaries
135: The D.R. Incident

What he saw was that 20 different government organizations in Costa Rica were hit with this Conti ransomware. This was a very widespread problem within their government, so it's no wonder they were reaching out for help anywhere they could. Many parts of the Costa Rican government came to a halt, and they were frantic over there.

Darknet Diaries
135: The D.R. Incident

What he saw was that 20 different government organizations in Costa Rica were hit with this Conti ransomware. This was a very widespread problem within their government, so it's no wonder they were reaching out for help anywhere they could. Many parts of the Costa Rican government came to a halt, and they were frantic over there.

Darknet Diaries
135: The D.R. Incident

But this gave Omar the ability to research and understand this Conti ransomware better.

Darknet Diaries
135: The D.R. Incident

But this gave Omar the ability to research and understand this Conti ransomware better.

Darknet Diaries
135: The D.R. Incident

Wow, that's really remarkable. See, when I hear that 20 departments were hit, I immediately think that there must be some central connection that allowed the malware to spread internally. You know, like if you can get in through the front door, now you can take a tunnel to all the other buildings or something.

Darknet Diaries
135: The D.R. Incident

Wow, that's really remarkable. See, when I hear that 20 departments were hit, I immediately think that there must be some central connection that allowed the malware to spread internally. You know, like if you can get in through the front door, now you can take a tunnel to all the other buildings or something.

Darknet Diaries
135: The D.R. Incident

But no, what Omar saw was that each of these 20 departments were infected separately, some of which were infected through phishing emails and some from malware put right on systems that were connected to the Internet. But just because the malware got inside each of these places, it didn't actually turn on until the right time.

Darknet Diaries
135: The D.R. Incident

But no, what Omar saw was that each of these 20 departments were infected separately, some of which were infected through phishing emails and some from malware put right on systems that were connected to the Internet. But just because the malware got inside each of these places, it didn't actually turn on until the right time.

Darknet Diaries
135: The D.R. Incident

It was coordinated that when enough systems got infected, it would trigger the ransomware to lock all the computers at once and demand payment to unlock them. Now, the motive behind putting ransomware on systems like this is typically just to make money. I believe they were asking for $20 million to unlock Costa Rica's systems. So whoever did this seemed to be there only for financial gain.

Darknet Diaries
135: The D.R. Incident

It was coordinated that when enough systems got infected, it would trigger the ransomware to lock all the computers at once and demand payment to unlock them. Now, the motive behind putting ransomware on systems like this is typically just to make money. I believe they were asking for $20 million to unlock Costa Rica's systems. So whoever did this seemed to be there only for financial gain.

Darknet Diaries
135: The D.R. Incident

Costa Rica got their systems fixed up, and I don't think they paid the ransom. They had backups and restored, but Omar saw how this malware operated and worked. And he saw the methods they used to get in, and took this new knowledge to scan the Dominican Republic's national computer infrastructure to see if anything matched what was on Costa Rica's systems.

Darknet Diaries
135: The D.R. Incident

Costa Rica got their systems fixed up, and I don't think they paid the ransom. They had backups and restored, but Omar saw how this malware operated and worked. And he saw the methods they used to get in, and took this new knowledge to scan the Dominican Republic's national computer infrastructure to see if anything matched what was on Costa Rica's systems.

Darknet Diaries
135: The D.R. Incident

After all, the malware seemed to be present in Costa Rica's network for a while before it actually executed. So he looked through computer after computer and scanned lots of systems looking for things that matched what he saw in Costa Rica. He didn't find anything, actually, which seemed like the Conti ransomware gang wasn't targeting the Dominican Republic, which was good.

Darknet Diaries
135: The D.R. Incident

After all, the malware seemed to be present in Costa Rica's network for a while before it actually executed. So he looked through computer after computer and scanned lots of systems looking for things that matched what he saw in Costa Rica. He didn't find anything, actually, which seemed like the Conti ransomware gang wasn't targeting the Dominican Republic, which was good.

Darknet Diaries
135: The D.R. Incident

But then, while looking for malware in the network, he noticed something. Someone had defaced a Dominican Republic government's website. They found a vulnerability on the web server and changed the pictures and text to something else. So he zoomed into this to investigate.

Darknet Diaries
135: The D.R. Incident

But then, while looking for malware in the network, he noticed something. Someone had defaced a Dominican Republic government's website. They found a vulnerability on the web server and changed the pictures and text to something else. So he zoomed into this to investigate.