Exploring Information Security - Exploring Information Security podcast

how to monitor the inner workings of a cybercriminal organization

0:00
47:18
Recuar 15 segundos
Avançar 15 segundos
Summary: What does it take to monitor the inner workings of ransomware gangs? In this episode, Matthew Maynard shares his firsthand experience infiltrating cybercriminal communities to gather valuable threat intelligence. From learning the lingo to navigating criminal hierarchies, Matthew sheds light on the surprising structure and behavior of ransomware operators. We discuss the importance of operational security, the surprising transparency of cybercriminal forums, and how researchers can play a critical role in disrupting ransomware infrastructure. Topics Discussed: How Matthew got started monitoring cybercriminal groups The business model and hierarchy of ransomware gangs Use of AI, insider threats, and criminal marketing tactics Tools and platforms used by cybercriminals (Tor, Tox, Telegram, etc.) Lessons learned from forums, breach leaks, and failed infiltration attempts The value of open-source intelligence in tracking threat actors Why reputation matters—both for threat actors and researchers Operational safety tips for researchers entering dark web spaces Guest Bio: Matthew Maynard is a cybersecurity professional and threat researcher who specializes in tracking the behavior of ransomware gangs and cybercriminal forums. He shares his insights through articles on Hacker Noon and speaks regularly at conferences like ShowMeCon. Links & Resources: Ransomware.live

Mais episódios de "Exploring Information Security - Exploring Information Security"