Readit News logoReadit News
diego_moita · 4 years ago
What I suspect: the first ransom was paid by insurance, therefore it didn't hurt them, therefore they didn't bother protect themselves for the second.

Now just wait to see what will happen to your insurance rate after you pay the third ransom.

They certainly will begin to understand the need for backups.

SV_BubbleTime · 4 years ago
Most of these start as phishes to lower level employees. It makes sense to me that’ll happen again and I’m not sure I can say the solution is better backups.

Another issue with backups, is are you restoring to an already infected / immediately infectable state?

I think the better closer is “The certainly will begin to take security, training, and best practices seriously”.

hellbannedguy · 4 years ago
And let's not discount the moral of low paid, overworked employees, and companies that let low level managers run roughshod over lower level employees. My point is don't discount inside corporate espionage by disgruntled any level employees.

Thank goodness I didn't have access to a script that would lock up at least two of my past employers when coming up years ago? Then again, I personally haven't been that mad, but boy do I know employees who were.

I could say that we are all choir boys, but you piss on an employee, especially during a recession, well let's just say I have seen unpstanding guys rub magnets over hard drives over pure apathy. (The guy didn't know about strength of magnents, and it did not hurt anything.)

Plugging in a usb, or downloading a suspicious email is something I can see happening, especially to "those" companies.

I imagine Xfinity employees dream about it?

ryanmcbride · 4 years ago
I'd like to think security training can take care of it, that people can be careful and considerate and have a skeptical eye about every single message they receive. But it only takes one person and these huge companies employ so many people. So many times, even at companies with really strict security training I've seen people just walk away from their unlocked computers, click random links in emails, stuff like that. People are always the first line of defense but it's one of those one-sided battles, where every single person in the entire company has to make 0 mistakes, and an attacker only has to get lucky once.
ajsnigrutin · 4 years ago
> Most of these start as phishes to lower level employees. It makes sense to me that’ll happen again and I’m not sure I can say the solution is better backups.

Why? Secretary gets a call from a nigerian prince, starts that letter.exe she gets in her e-mail, her computer gets fscked, IT takes her drive, restores a clean image, and she gets back to work.

If the only copy of some important document is on his/her pc, or that pc can overwrite/delete the only copy, then they've fscked up by design... and yes, now better backups would help.

PeterisP · 4 years ago
There are many steps in the chain between a phish message and a ransomware attack - the user opening a phish is just one of them. You might prevent lateral movement afterwards, you may detect the attack in time (there often are days or even weeks between the phish and the ransom) to protect it, you might prevent the payload from reaching the user, etc. So yes, you're right, the solution is not just better backups but stepping up the whole security game - however that takes will, money and quite some time.
beermonster · 4 years ago
> Most of these start as phishes to lower level employees.

They used to (and probably still) do this. But more recently these folk are paying access brokers. A bit like bank robbers teaming up with criminal locksmiths.

> It makes sense to me that’ll happen again and I’m not sure I can say the solution is better backups.

You'll ideally need:

- Better security awareness training to cover human weakness such as spotting dodgy email and what to do if you click a link

- Patch vulnerabilities quickly as this will reduce risk considerably

- Company wide tested and sufficient backup strategy (most companies fail on this) to protect key identified data assets

- Regularly pen-test both your internal and external environments

Obviously it doesn't stop there, but those are key.

Deleted Comment

hnick · 4 years ago
Backups might get you up and running again, but the new hotness is threatening to release trade secrets, competitive advantages, and embarrassing emails. Even with an ironclad recovery some people might be inclined to pay in such a situation.
failwhaleshark · 4 years ago
Untested backups and DR/BCP procedures aren't backups.

Snapshots aren't backups.

Backups that aren't physically-isolated, typically offsite, aren't backups.

bottled_poe · 4 years ago
Well then, It’s starting to sound like backups aren’t what a business needs.
arendtio · 4 years ago
Please define snapshot.

I suspect you mean filesystem snapshots and as long as the snapshot lives on the same physical media you are correct. But when you take the snapshot and transfer it to a physically separate location where it cannot be altered it sounds like a backup to me.

etherael · 4 years ago
Why are offsite write only continuously incremental snapshots from a full start not backups?
dangerboysteve · 4 years ago
Or they overhauled the IT team.
hanniabu · 4 years ago
I'd say chances are somebody brought up concerns at most of these places but management told them not to worry for one reason or another.
VendorManager · 4 years ago
The insurance cost is increasing due to rising ransomware attacks. This is causing a lot of stress within insurance companies and insured companies. An HBR post cited that this is a new niche for insurance companies and 5 big ransom demands can wipe out the insurance premium they collected from 250 customers.

Relevant analysis here:

http://www.vendormanagementoffice.net/2021/06/cyber-insuranc...

dragonwriter · 4 years ago
Rudyard Kipling explained this:

---

But we've proved it again and again, / That if once you have paid him the Dane-geld / You never get rid of the Dane.

--- https://www.poetryloverspage.com/poets/kipling/dane_geld.htm....

By paying, you’ve just proven that you are a profitable target to hit.

dalbasal · 4 years ago
I'm from Dublin. We didn't pay the Danegeld, and in retaliation they built a city.
pas · 4 years ago
Could you explain that a bit? :o
spywaregorilla · 4 years ago
The most important line:

> 80% of organizations that paid the ransom were hit by a second attack, and almost half were hit by the same threat group.

The same group!

tyingq · 4 years ago
Makes sense to me. From what I've read, it's pretty clear the ransom payment is for a one-time ability to get your data back. It's not advertised as some sort of permanent opt-out.
dylan604 · 4 years ago
Everyone knows that once you find a loose slots machine, you keeping playing it.
cdstyh · 4 years ago
Makes more sense if the group offered a subscription model for decrypting files encrypted by that group. Then you wouldn't have to keep paying the big lump sum.
meowface · 4 years ago
Different groups have different policies. I believe some do actually add you to a whitelist if you pay and grant you at least a year or two before your immunity expires. (Maybe some do permanent whitelists? Not sure.)
ffhhj · 4 years ago
Coming soon: ransomware with subscription business model
denton-scratch · 4 years ago
I think it is, actually. Well, not advertised; but these big ransoms, they can be negotiated. And one of the victim company's requirements will be that if I pay, then you agree to leave me alone.

I think these negotiations are fine, if you're just buying time to gather your backups; I've assumed the payouts were made by insurance companies, so go ahead - buy a zero-value promise from a gang of crooks, if you want.

But your org has been rooted (at best, you can't prove it hasn't). Compromised systems can't be really be cleaned, they have to be reinstalled from scratch, if you want to have confidence in them.

And an attack can be stored in data - which you're about to restore from backup. That's a problem I have faced, and I chose to ignore that threat. No choice - I didn't know how to address it then, and I still don't now.

My half-baked opinions about ransomware are largely based on watching this documentary: https://www.bbc.co.uk/programmes/w172wx9056p6bd6

judge2020 · 4 years ago
Although I think false advertising would be the least of their worries if they decided to do it.
qyi · 4 years ago
You sure some ransomware crooks don't provide contracts to their clients?
abledon · 4 years ago
Where is the hacker's Honor... Cmon man
hiccuphippo · 4 years ago
It's right there in the small print. These companies sure know about that.
nhumrich · 4 years ago
I mean, of course! This is like classic sales book play. Your previous "costumers" are almost always less effort to dollar than new prospects.
ineedasername · 4 years ago
I'm shocked at such unethical practices by the hackers. I expected better from a group of terrorists.
snek_case · 4 years ago
I'm kind of reminded of the mafia and their protection rackets. Obviously, you never could trust criminal organizations. At the same time, if you're a medium-sized corporation or small business and they have your important data, and you know you could pay to get it back, what do you do? I can imagine they really have some people by the balls, metaphorically speaking. They could drive you bankrupt.

I hope the authorities find a way to go after these people, but it's obviously got to be difficult, because they might well be in China or Russia. It would take some international cooperation that's probably impossible right now.

In the meantime... Switch to Linux, have a competent offsite backup strategy...?

redisman · 4 years ago
What would be the incentive not to? Honor among thieves?

You know they’re vulnerable to the attack (the hard part?) so why not keep doing it until they shore up their defenses.

hackflip · 4 years ago
Short term you benefit from the second random. Long term, you may make people less likely to pay your ransoms.
bostonsre · 4 years ago
Wonder what percentage of those that were hit had someone actively looking to get back in. Maybe 20% learned their lesson and improved their security. I wonder how many iterations of this will it take for most companies to learn that leaving your doors unlocked in a shady neighborhood/the internet is a bad idea.
mysterydip · 4 years ago
if it were me, I'd leave webshells or other backdoors to let myself back in if they didn't do proper cleanup. Especially if they paid, I have a "known good" customer.
vlunkr · 4 years ago
Unless the attackers revealed their exploit, it probably wasn't fixed and they just got in again the same way.
sslayer · 4 years ago
It makes you think about how many of those are inside jobs and/or compromised employees. In the case of colonial, it would seem highly likely given it was a credential compromise, but then again secure passwords are a known weakness
jdsully · 4 years ago
"threat group" is odd phrasing, is it really the same actual group?
AnimalMuppet · 4 years ago
Were I an evil criminal, I'd include a backdoor in the restore image I gave them, so that I could attack the same people again.
Black101 · 4 years ago
I would leave a backdoor too if I was them (maybe not what they did)... I wonder how many paid for a 2nd and 3rd time...

Dead Comment

tempfs · 4 years ago
I mean they just proved that they are willing to pay the ransom. If they are also unwilling or unable to clean up their shop and keep it from happening again, it surely will.
avgDev · 4 years ago
It is almost like the groups hacking them are providing a good service. If they get hacked once, shit happens. But if it happens multiple times then someone should probably answer for it.
chihuahua · 4 years ago
"We don't have money in the budget for backups. But we do have money in a different budget for ransom payments!"

Deleted Comment

ArkanExplorer · 4 years ago
The responsibility lies at the nation-state level, and the clear decision is for Governments to ban the formal exchange of cryptocurrencies.

As soon as this occurs, ransomware events will collapse since the ransoms will become unpayable.

The negatives of cryptocurrencies (ransomware enablement, chip and electricity shortages, scams) clearly outweigh the positives at this point.

kemonocode · 4 years ago
If you believe banning cryptocurrencies will suddenly stop ransomware, then I have a bridge to sell you.
qyi · 4 years ago
Ah yes, we should outlaw the ability for people to send money to each other and have civilization take the burden of incompetent corporations that can't be bothered to follow basic infosec practices (let alone whatever product they are selling in the first place is probably garbage and has no value beyond monopoly).
ohyeshedid · 4 years ago
The ransom side is already a crime, and it being labeled a crime doesn't stop it from happening. Laws don't prevent crime.
bouncycastle · 4 years ago
This view is similar to saying things like "The terrorists and the media have a symbiotic relationship and the media is responsible for enabling terrorist attacks, therefore let's ban the media".
cableshaft · 4 years ago
Cryptocurrencies are decentralized. It would have to be banned literally every country in the world for them not to be able to use it and convert to a non-digital currency. Good luck with that.

And I'm sure they'd just invent or go back to some other method -- possibly riskier and more violent -- so they can continue to ransom money from people.

anikan_vader · 4 years ago
Looks like ransomware criminals are going for the subscription model.
marcosdumay · 4 years ago
Once the criminals start maintaining their own backups of victims data and helping them restore from rival attacks, they can successfully call themselves a mob.

Somehow, that's a quite believable scenario.

tomrod · 4 years ago
https://en.wikipedia.org/wiki/History_of_firefighting#Rome

Fire fighting in Rome had a similar premise.

stretchwithme · 4 years ago
If only organizations would backup their own data. Then they could just restore and avoid paying.

I have a backup device of my own at home and that's the one I have to use. The company I work relies on some MSFT service that is pretty inflexible and won't back up the entire machine.

smnrchrds · 4 years ago
> they can successfully call themselves a mob

Or Backblaze's evil twin.

tshaddox · 4 years ago
If only there were organizations who weren't criminals at all and who could be paid by a company to maintain backups of the company's data.
tempestn · 4 years ago
The criminals already do often recommend firms to manage the payment and recovery process.
josephorjoe · 4 years ago
I think they can start calling themselves the corporate IT department.
pokstad · 4 years ago
For a second there, I thought you were going to say they can call themselves a backup service.
cblconfederate · 4 years ago
AB testing shows 80% of the customers like it
gentleman11 · 4 years ago
Their engagement is through the roof and we have the data to prove it
Drakim · 4 years ago
To unsubscribe you have to talk to a sales representative and send in a fax.
cronix · 4 years ago
Just click that innocent looking unsubscribe link at the bottom of the email. Case solved!
tartoran · 4 years ago
Hardest part is to find subscribers, from then on the milking process is easy. Leaving the joke aside, does this mean that the systems remained unprotected after the initial ransom was paid or that they continued to threat leaking sensitive data?

Paying the ransom a second time would guarantee nothing. Neither was paying the first time either.

ljm · 4 years ago
If they were caught in the first place and paid up, the attacker presumably learned enough about the infra to find another way in? Or it was social engineering.

Like, is a company who runs its IT infra on Windows XP and pays the ransom likely to switch to the latest and greatest, no expenses spared, in a total and utter overhaul of all their systems? Or will they only try to patch the holes that were already revealed and gloss over the rest? Blame it on the intern, all that.

arthurcolle · 4 years ago
I wonder if there are like Russian mob investors in these cybercrime "startups" and they also have to make decks that show YoY revenue / user growth. Lmao!
trutannus · 4 years ago
Well, to my understanding, fronting money in drug deals for a cut and interest is a common model crime already, so I would say it's more likely than you think. The only difference between VC funding and bankrolling the mob is one is legal.
mc32 · 4 years ago
I wonder if this hurts their reputation.

If they earn a reputation of coming back for seconds...

Two things:

People fix things faster to prevent double dipping.

People opt to not pay the initial ransom if they’re going to be taken hostage again.

It’s a kind of tragedy of the commons where the commons are the potential victims.

jnwatson · 4 years ago
It doesn’t even have to be the same attacker. The attacker could just as easily sell the info to another attacker.

Plus, if the original vuln used to gain access is still open, there’s no reason why somebody else doesn’t find it later.

ineedasername · 4 years ago
They're becoming a file encryption service. No one can steal your files either because they will just get encrypted trash.

Though I suppose those thieves could also pay for the encryption key, or just go directly to the "service provider" for a paid copy.

fiddlerwoaroof · 4 years ago
“Data escrow service”
jbverschoor · 4 years ago
RaaS
abledon · 4 years ago
Do they have the Java SDK released yet?
arcticbull · 4 years ago
I'm looking forward to one of them going public in a country where ransomware is legal lol, seems like they've got really solid ARR.
ozim · 4 years ago
Well beating up someone to death will bring you money once, beaing someone multiple times will bring you more money.

Ransom gangs are business oriented.

akomtu · 4 years ago
Meh, it looks like the ransom businesses have customer retention problem if only 80% stay.
dheera · 4 years ago
How the hell do people got hit with ransomware anyway? Do they not have offline nightly backups of critical data?
wrycoder · 4 years ago
See my post in the peer thread.
chucka9 · 4 years ago
Why not just the prices up?
admax88q · 4 years ago
Meaningless stat without a baseline to compare against. How many who didn't pay were hit again?
jessaustin · 4 years ago
If the attacker isn't paid for the first attack, why would she attack again? She's not doing it for the lulz!

I do agree with you that there should be more visibility for the "silent majority" of firms who operate their businesses responsibly, and therefore don't ever need to pay ransom.

Trias11 · 4 years ago
Because second attacker might not be briefed by the first one.
kristopolous · 4 years ago
That's not for us to intellectually deduce, give the numbers. They have it. Is it 79%? 99? 1?

Maybe it's all automated shotgun based attacks and they don't close the holes and so the act of paying the ransom is statistically meaningless

This is shoddy journalism. Might as well just say "X%". It implies you shouldn't pay lest you fall victim again but they don't actually say that.

Things that implicate what they refuse to say is kind of suspect

TameAntelope · 4 years ago
The whole point of gathering statistics is that making up logic for what could be the case is generally a massive waste of time.
arnvald · 4 years ago
If the victim doesn't pay the first time, they suffer consequences and next time might decide to pay instead.
admax88q · 4 years ago
The attacks are likely automated. Like any computer virus.
Tade0 · 4 years ago
I'm sorry but I have to ask: why assume the attacker is female?
insickness · 4 years ago
It's likely the reinfection rate is high in both cases since it's so difficult to ensure every possible back door has been closed.
makeitdouble · 4 years ago
“Never negotiate with terrorists” is a simple and clear mantra, and as most clear and simple concepts it hides a lot of assumptions.

One of them is you are ready to lose the hostage in the worst case scenario. That’s how the police sees it, because the society benefits more from being firm in individual cases than losing a few of its members that might not come back anyway.

That’s a hard one to swallow, hard enough that govs also sometimes can’t follow the mantra and just pay the ransom.

It’s crazy hard to get people to sacrifice themselves for the better good, it’s yet a bigger ask for corporations who already screw the public day in day out.

nradov · 4 years ago
The US government has negotiated with the Taliban (a formally designated terrorist group) for prisoner exchanges.

https://www.bbc.com/news/world-asia-50471186

koheripbal · 4 years ago
The "don't negotiate with terrorists" is itself a negotiation tactic meant to lower the attack surface of any entity.

It's the sort of thing you say publicly, but then privately you settle with your adversary.

Absolutism is never a useful tactic.

enkid · 4 years ago
Never negotiate with terrorists is only a thing because it puts you in a stronger negotiation position.
cwkoss · 4 years ago
And it's just posturing. I'm sure the US negotiates with groups it labels as terrorists through backchannels.
formerly_proven · 4 years ago
> “Never negotiate with terrorists” is a simple and clear mantra, and as most clear and simple concepts it hides a lot of assumptions.

This has nothing to do with that idea.

The reason the orgs paid the random once was because they had a severe lack of backup and other data safety protocols in combination with a vector to be infected (from all what we know, the latter is common and difficult to avoid): paying the ransom is likely their only choice to maintain the business.

It is not surprising at all that these orgs can and will be infected again, and will continue to show a lack in the security and data safety departments, and so they will continue to pay ransoms.

It's sort of an inverse survivorship bias: if you get infected once because you're susceptible, you're likely to get infected again unless you fix your susceptibility.

kelnos · 4 years ago
I think that mantra does work here.

I would be totally fine with legislation making it illegal to pay in the case of ransomware attacks. Some companies might be completely destroyed by an attack that they can't pay off, but that is for the greater good of society: if criminals know companies have a low probability of paying since they're legally barred from doing so, they're less likely to target them.

thepete2 · 4 years ago
It has from a certain angle: For society/the internet as a whole it might be better for no one to pay the ransom at the cost of some of them perishing. The ransomware attacks would become unprofitable and would eventually stop. But to assume any organization wouldn't pay the ransom if its survival depends on it is obviously unrealistic.
avgDev · 4 years ago
I mean couldn't government pay the ransom and then go great lengths to track the suspects and send special forces after them? Surely US govt. has the ability to track almost anyone.

Having US govt. on your ass should a decent deterrent.

Just take a look at how hard FBI came down on cartels and individuals who were involved in killing Enrique Camarena. Cartel leaders were arrested in Mexico and several individual in the US.

microtherion · 4 years ago
It appears that some of the major ransomware gangs are operating from Russia and are tolerated by the government, as long as they don't hit domestic targets.

The US cannot really send special forces there without risking a massive escalation.

Griffinsauce · 4 years ago
That introduces a scale problem. Even for the US.
SamBam · 4 years ago
When they hit a hospital, what is the hospital supposed to do? Not negotiate, for some "greater good" and let patients die?

https://threatpost.com/ransomware-hits-hospitals-hardest/162...

makeitdouble · 4 years ago
I am sure an IRL hostage situation alrrady happened at an hospital, so we could have the answer in a variety of cases.

My opinion would be the hospital should open up to the police and accept their fate whatever the outcome. The gov./police makes the calculation of the impact of X people dying a very public way, the Y amount that is requested, and the ton of other wildcards (e.g. can we catch the gang now ? after the ransom is paid ? void the ransom some way afterwards ? limit the number of death in other ways ? what will the other victims take away fom this case ?).

At the end of it there should be a custom approach to that specific situation and not some blanklet policy application.

This also assumes a cooperative and somewhat decent police force, which might not be the case everywhere (but then I think we're screwed anyway)

SwanRonson · 4 years ago
They’re supposed to back up their data and set up proper contingencies. By failing to do so, they are already putting patients lives in the hands of the encryptors.

Dead Comment

denton-scratch · 4 years ago
"“Never negotiate with terrorists” is a simple and clear mantra, and as most clear and simple concepts it hides a lot of assumptions"

The word 'terrorists', for one. It's mostly used to mean 'my opponents' these days.

What we are facing with ransomware is not insurrectionists or protestors, but gangsters. They make their living by stealing from people, cheating them, and threatening them. Many insurrectionists are honourable people that you can safely make a deal with. There is no gangster with that property.

Take backups, test the recovery procedure, don't make bargains with gangsters.

dilyevsky · 4 years ago
I don’t think this mantra was ever anything more than a meme. LE always negotiate, this mantra is designed to just better their negotiating position
smnrchrds · 4 years ago
> because the society benefits

That's the theory. But much like war on drugs or TSA, whether its real-world outcomes match the theoretical ones is debatable.

https://www.newamerica.org/international-security/policy-pap...

kag0 · 4 years ago
From another comment, it looks that mantra will become law in the US

https://cisomag.eccouncil.org/paying-ransom-is-now-illegal-u...

MattGaiser · 4 years ago
Isn't that just applying existing sanction law to ransomware?
Siira · 4 years ago
It’s not really about sacrificing people for the greater good. Negotiating has high externalities that include future murders. Like all externalities, the involved people don’t give a shit.
kortilla · 4 years ago
> who already screw the public day in day out

And then everyone clapped at the high-brow analysis.

notdang · 4 years ago
Until your own child or spouse is held hostage or sequestrated. You will negotiate.
henvic · 4 years ago
Taxation works exactly like this.

You might even want to establish an isolated society, but if you try, good luck dealing with the IRS.

andrewmcwatters · 4 years ago
From the perspective of the individual, there is no greater good than defending one’s self.
kag0 · 4 years ago
Hardly. There are many philosophies that argue that the greatest good lies with how we interact with the other.

And on a purely primal level it's common to prioritize one's offspring over one's self. I think most cultures recognize this intuitively.

makeitdouble · 4 years ago
I tried to put it in a neutral way, and I think it’s a far from a black and white issue.

Not to go too sideways, but hostage (with humans, not data) situations are typically about other people. When you’re the target, it’s not your life on the line, but your loved/valuable ones. So you’re not defending just yourself, you actually have to care about at least someone else to have it happen to you. And some care about a lot more than just their loved ones, they’ll also think about their friends, family, sometimes the rest of the society.

Everyone is different and there is no absolute best, but let’s at least recognize it’s complex and there’s lots of ways to think about it.

SamBam · 4 years ago
What an absurd statement, to just say unequivocally, ignoring the plenty of philosophies and ethical systems have disagreed entirely with that.
flowerlad · 4 years ago
I don't see any discussion of typical entry points. How do these guys get into the system? Is it by having someone download a malicious file? If so what type of file? PDF? MS Office? If so Adobe and Microsoft should be held accountable for their security holes, only then will they have enough motivation to maybe consider rewriting some of their code in a safer language such as Rust.
perlgeek · 4 years ago
The entry points are "whatever works".

Typically:

* Password spraying from previous data leaks

* Good old-fashioned fishing

* Bugs in anything that's common in enterprises, exposed to the Internet and not patched fast enough, including MS Exchange, various security/VPN products, vcenter, you name it. All of these had pretty critical pre-auth bugs exposed just this year

* malicious browser plugins

* malicious O365 apps

... and so on.

TwoBit · 4 years ago
Lack of MFA, lack of hardware whitelisting, servers exposed directly to the Internet, lack of user privilege restrictions, allowing passwords that are known-compromised, ...
anthk · 4 years ago
- VBA macros

- ActiveX for legacy ad-hoc software

lurquer · 4 years ago
Agree.

There is much confusion and many bad analogies surrounding this issue.

Some claim - without evidence - that nation states are behind it. Which, with a moments reflection, is absurd; nation states may have an interest in disabling certain systems for military purposes (at the appropriate time), but no nation state needs ransom money. Easier ways for a government to get money; namely, just print some.

Others liken it to the mafia or cartel or other well-organized criminal organizations. This too misses the mark.

Like most business crimes, the culprit is almost always an insider. Period. As the tools to pull this off are trivial to come by on the internet, the obvious suspect would be some disgruntled IT person within the company.

It’s as if — after a bank robbery — everyone claims it must have been some crack team of Russians flown in under radar in helicopters. Instead, they should be looking at the numerous employees who have access to the security system and the safe.

But, it’s much more exciting to pretend that Putin is sponsoring hackers to get trivial amounts of money from companies across the globe. Ha.

I’m not even an IT guy, but at my last job, even I had access sufficient to destroy or corrupt all the data. That was before cryptocurrency and the like... I assume assembling a ransomware set of tools off the internet is no more or less difficult than it was to assemble a set of tools to make pirated copies of AdobePhotshop back in the day.

squiggleblaz · 4 years ago
> Easier ways for a government to get money; namely, just print some.

What is money? If a government wants more domestic resources, it can get it by printing money. If a state is so limited in domestic resources that it fundamentally needs resources from outside, printing money doesn't help. Printing money can help a state devote more of its country's resources to trade, but if no one wants to trade with you at any cost, it doesn't matter what parts of the local economy the state controls.

North Korea has incentives compatible with these kinds of acts, and relatively few interesting ways of deploying software engineers locally.

perl4ever · 4 years ago
>no nation state needs ransom money. Easier ways for a government to get money; namely, just print some

Sure, this is obvious, makes intuitive sense, except...it explains why something like Iran-Contra or the equivalent in other countries can't happen.