Beyond Encryption: Exploring the Tactics Ransomware Operators Use During Negotiation & their Impact

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=e1DyJsv1IQc



Duration: 25:56
101 views
3


SANS Ransomware Summit 2023

Beyond Encryption: Exploring the Tactics Ransomware Operators Use During Negotiation and their Impact

Speakers:
Bryce Webster-Jacobsen, Director of Intelligence Operations, GroupSense
Sean Jones, Senior Intelligence Analyst, GroupSense

Ransomware is one of the most destructive and lucrative forms of cyber crime. While encryption is the hallmark of ransomware, negotiation is the critical phase of the attack where attackers interact with the victim and negotiate a ransom payment. In this talk, GroupSense experts Bryce Webster-Jacobsen and Sean Jones will delve deep into the tactics that ransomware operators use during negotiation and explore their impact on organizations. They will examine the psychological tactics used by attackers, their use of social engineering, and the tools they use to manipulate victims. The session will conclude with practical advice for businesses to mitigate the risks of ransomware attacks. Outline: Introduction Explanation of the negotiation phase of a ransomware attack; review of what Bryce and Sean experience through negotiation Importance of understanding negotiation tactics Tactics Used by Ransomware Operators During Negotiation Psychological tactics Fear, uncertainty, and doubt (FUD) Building rapport with the victim Social engineering tactics Impersonation and deception Pretexting and phishing Tools used by ransomware operators during negotiation Cryptocurrency transactions Dark web communication platforms Impact of Ransomware Negotiation Tactics on Organizations Financial impact Ransom payments Business interruption Reputational impact Public perception of the organization Loss of customer trust IV. Conclusion A. Recap of the tactics and impact of ransomware negotiation B. Final thoughts and recommendations for businesses to protect themselves from ransomware attacks.

View upcoming Summits: http://www.sans.org/u/DuS




Other Videos By SANS Institute


2023-08-31FEATURE SEGMENT: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis
2023-08-29Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023
2023-08-22In Hot Pursuit: Tracking Ransomware Actors | Ryan Chapman | Aug 22, 2023
2023-08-17Analysis on legit tools abused in human-operated ransomware
2023-08-17Lessons from the Frontlines: Ransomware Attacks, New Techniques, and Old Tricks
2023-08-17Panel | Going Dark: DOS’ing Yourself for the Better
2023-08-17Cracking Ransomware: Bypassing Anti-Analysis Techniques and Decrypting LockBit Black Ransomware
2023-08-17Jackpot! Three Years Of ESXi Ransomware Incidents
2023-08-17Data Science for Ransomware Defense and Negotiation
2023-08-17A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
2023-08-17Beyond Encryption: Exploring the Tactics Ransomware Operators Use During Negotiation & their Impact
2023-08-17You Got a TOAD: A Novel Technique for Dropping Ransomware
2023-08-17Keynote | A Post-Apocalyptic Hellscape: What Ransomware Looks Like After RaaS
2023-08-15Your Cloud Security Journey: Key Trends, Capabilities, & Skills
2023-08-15FEATURE SEGMENT: Your Cloud Security Journey: Key Trends, Capabilities, & Skills
2023-08-15NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
2023-08-08Rule-Breakers Unite: Reimagining SANS HackFest
2023-08-03No Experience Required – Gaining Clarity for a Career in Cybersecurity
2023-08-02Unpacking the New SEC Regulations with John Pescatore
2023-08-01The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
2023-07-27SANS Threat Analysis Rundown (STAR) with Katie Nickels



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training