VMware
REAL Ransomware Chat Logs
|| Track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface …
[ad_2]
source
|| Track down shady sellers, hunt for cybercrime, or manage threat intelligence and your exposed attack surface …
[ad_2]
source
Lorem ipsum dolor sit amet, consectetur.
John! Can you sandbox a cryptolocker with some fake juicy stuff and get your own convo? Maybe use an Exchange and domain lab on old esxi??
LOL, 19:20,
"and guarantees to not attack us in the future."
"Sure."
Last one was definitely trying some social engineering to get some information. But obviously it wasn't gonna go anywhere
I mean these are the same companies that won't spend any money on security because some mba thinks it's an unnecessary expense and they have to hit quarterly kpi's and profits!
really interesting stuff ๐
Part two ๐๐๐๐
๐
Sad when the RAS OP has better communication skills and grammar than IT staff. Additionally, the number of IT staff that can't open the test files are nutty. ๐คฏ
Might have to start doing this
Are you for hire?
If I encrypt my information (with windows Bitlocker for example ), does that deny hackers access to the plaintext on its face? I know they can just get the encryption key, but how much more difficult would it be?
Windows is straight trash they need to use apple maybe apple enterprise
this is better ai gpt chat roleplay
The fact that also tells you how they hacked into your system is quite dystopian. ๐
moar
If companies would just invest in a real-time incremental backup, none of this sh*t would be happening. Got infected? No problem, just roll it back by a couple of hours to the encrypted data. Or have real-time monitoring software any encryption taking place in real time.
Maybe last guy was complimenting to just buy time and had no interest in paying from get go?
This is very interesting to see
I refuse to believe those guys are from IT, really!?
The company I work for got hit a few months ago and we never even contacted them. Don't negotiate with the criminals
"we have mcafee and symantec" and nothing prevented this :("
Peak.
Overwriting memory is too complicated for a SOC analyst?
wow, what a great video
Although funny I believe they praise these threat actors to buy some time
good stuff, crazy crazy crazy stuff.
I received such a threat. I told them to prove they had my information by telling me the address where I am located. Crickets… You can't just Google me and find me. I am off the grid.