Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Alberto Daniel Hill. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Alberto Daniel Hill or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Crypto24 Playbook: An Analysis of the Banco Hipotecario del Uruguay Ransomware Campaign

47:39
 
Share
 

Manage episode 516830097 series 2535026
Content provided by Alberto Daniel Hill. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Alberto Daniel Hill or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

The sources consist of an in-depth LinkedIn article detailing the Crypto24 ransomware attack on a bank and a LinkedIn error page that suggests alternative content to explore. The article, written by Michael Slowik, explains how the Crypto24 group successfully breached the bank by exploiting basic security vulnerabilities such as weak passwords and poor network segmentation, mapping the attack steps to the MITRE ATT&CK framework. This extensive case study emphasizes that simplicity defeated sophistication as the attackers used readily available tools and exploited fundamental security failures, contrasting the incident with the CISA control framework to highlight where the bank failed to protect 700GB of sensitive data. The second source is a generic "page not found" message from LinkedIn that redirects users to various popular content topics and categories, including business, technology, and career advice.

https://cybermidnight.club/the-crypto24-playbook-an-analysis-of-the-banco-hipotecario-del-uruguay-ransomware-campaign/

  continue reading

742 episodes

Artwork
iconShare
 
Manage episode 516830097 series 2535026
Content provided by Alberto Daniel Hill. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Alberto Daniel Hill or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

The sources consist of an in-depth LinkedIn article detailing the Crypto24 ransomware attack on a bank and a LinkedIn error page that suggests alternative content to explore. The article, written by Michael Slowik, explains how the Crypto24 group successfully breached the bank by exploiting basic security vulnerabilities such as weak passwords and poor network segmentation, mapping the attack steps to the MITRE ATT&CK framework. This extensive case study emphasizes that simplicity defeated sophistication as the attackers used readily available tools and exploited fundamental security failures, contrasting the incident with the CISA control framework to highlight where the bank failed to protect 700GB of sensitive data. The second source is a generic "page not found" message from LinkedIn that redirects users to various popular content topics and categories, including business, technology, and career advice.

https://cybermidnight.club/the-crypto24-playbook-an-analysis-of-the-banco-hipotecario-del-uruguay-ransomware-campaign/

  continue reading

742 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play