#50 – You Are On The Front Lines Of A Cyber War, And It Just Escalated


img_4479

EFFECTED USERS: Everyone who uses computers.

Hair of fire 5 of 5

SUMMARY: Cyber war is a new type of warfare, and you and your business really are involved.

Obviously, Criminals like to get paid, but don’t like to be prosecuted

Lots of types of crimes; let’s talk specifically about Extortion and Ransom

In the beginning, there was cash.  Criminals could not use other electronic forms of payments for extortion or ransom (credit cards, wire transfers, etc) because it would be easier for authorities to prosecute  them (criminals don’t like to be prosecuted) *and* the actual funds could be seized though legal means like court orders, and working with the governments of friendly countries.

The problem with cash: it’s a physical object.  The criminal needs to find a way to get the victim to transport and hand-off the cash without the criminal getting caught, meaning the criminal and the victim needed to at some point be in the same place, even if at different times – – reference the plot of a few hundred Hollywood movies and (probably) tens of thousands of FBI files.

Along came Bitcoin and other cryptocurrencies…This changed everything.  Cryptocurrencies are based on a key, (or a long  string of alphanumeric characters). Cryptocurrencies are *not based on a user identity (like a bank account or a credit card.

For the first time, criminals could use an electronic form of payment *without* being in the same place as the victim.  This changed everything, and gave rise to ransomware (define ransomware).

But the other thing about Bitcoin and cryptocurrencies is that all transactions are ‘public’ – can see all Tx for each account.  So, if the criminal ever wants to convert their Bitcoin into cash, that could be traceable event. (Criminal like to get paid.)

So, law enforcement carefully traces payments to a bitcoitn (or other) crypto account, and waits for funds to get to a place where they can seize it.  That was largely theoretical until this week.

You may have heard of the Colonial pipeline ransomware attack….

Fuel shortages at Charlotte Douglas International Airport caused by the pipeline shutdown, American Airlines changed flight schedules temporarily.[21] At least two flights (to Honolulu and London) had fuel stops or plane changes added to their schedules for a four-day period. The shortage also required Hartsfield–Jackson Atlanta International Airport to use other fuel suppliers, and there are at least five other airports directly serviced by the pipeline.[22]

 

Fuel shortages began to occur at filling stations amid panic buying as the pipeline shutdown entered its fourth day.

A recent article in USA TODAY entitled,

Majority of $4.4 million cryptocurrency ransom payment in Colonial Pipeline hack recovered

included this:

In the Colonial case, investigators were able to track multiple transfers of bitcoin by reviewing a public ledger, according to court documents. The transfers represented payments made by Colonial that had been transferred to an “address” whose password or “private key” was known to the FBI, which then recovered the money.

This changes everything…

Here with me today to talk about this is:

Konstantine Zuckerman is the CEO CYBRI a New York-based cybersecurity company focused on Red-Team penetration testing to help small and medium-sized enterprise (SME) detect critical vulnerabilities in their systems and networks.

Q: Why would criminals target Colonial Pipeline?

 

If you are the victim of ransomware, go to: https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/ransomware

Cybri official website: www.cybri.com
CYBRI Twitter: https://twitter.com/CybriUSA

CYBRI Facebook: https://www.facebook.com/CYBRI/ 

CYBRI LinkedIn: https://www.linkedin.com/company/cybri
CYBRI Instagram: https://www.instagram.com/cybri_official

Konstantine-Zuckerman-1280x768-B

Published by

Unknown's avatar

David W. Schropfer

David W. Schropfer is a technology executive, author, and speaker with deep expertise in cybersecurity, artificial intelligence, and quantum computing. He currently serves as Executive Vice President of Operations at DomainSkate, where he leads growth for an AI-driven cybersecurity threat intelligence platform. As host of the DIY Cyber Guy podcast, David has conducted hundreds of interviews with global experts, making complex topics like ransomware, AI, and quantum risk accessible to business leaders and consumers. He has also moderated panels and delivered keynotes at major industry events, known for translating emerging technologies into actionable insights. David’s entrepreneurial track record includes founding AnchorID (SAFE), a patented zero-trust mobile security platform. He previously launched one of the first SaaS cloud products at SoftZoo.com, grew global telecom revenue at IDT, and advised Fortune 500 companies on mobile commerce and payments with The Luciano Group. He is the author of several books, including Digital Habits and The SmartPhone Wallet, which became an Amazon #1 bestseller in its category. David holds a Master of Business Administration from the University of Miami and a Bachelor of Arts from Boston College.

One thought on “#50 – You Are On The Front Lines Of A Cyber War, And It Just Escalated

Comments are closed.