Who was the sound engineer on this video??? WTF??? Seriously, WTF? Sound from footage, back from the 1950s is better than this. Whoever the sound engineer is, he/she needs to be sacked asap. This video shouldn't have even been uploaded with such bad audio.
Dude humility and integrity are luxuries some can not afford. Not out malicious for other. But necessary defense of them. Thus company can afford it. Many more can not. No matter the causality.
doesn't work like that, do you think that even if they paid everything would be alright? they would ask for more the moment they paid, that is how scammers work.
@@hotsmine1573 Not always if you read the news many institutions get hit, pay, and get their files back. For many, even if they have backups. Restoring the systems will cost 'more' than the ransom. I just got up. I will post the examples when I get a chance.
Paper and DVD-R records cannot be encrypted by hackers. 1. Isolate and backup critical data on a daily or weekly basis. 2. Print all orders and al invoices, as soon as they are received/issued.
Is it only me, but first I hear you only in my left ear, and then only in the right, using headphones, the music chanel is also for a short time on other ear
@@wesalois The difficulty is that you don't even know if the bad guys can decrypt. There have been incidents in the past where poor code has made it imposible to reverse. Second you have proven yourself to be a target that pays, so why wouldn't they just wait and do it again.
The hackers are just taking advantages of the weaknesses that the software manufactures have built into modern computer systems. A whole industry has grown up to fix the security holes in poorly designed OS systems. For a fee, you can buy additional firewalls and virus killer software. These slow computer systems down trying to plug the leaks in the original OS software. It is time for the software manufactures to bear the costs of the poor security of their products and it's under tested code often archaic code. The software producers put backdoors into their code for their own commercial advantages. Computer operating systems need to be redesigned from the ground up to make them secure. It is perfectly possible to put hardware interlocks into computer systems to make the systems hack proof. This is not happening because the major OS manufactures want the ability to do remote system updates anytime they want. For PC users, the OS manufactures also want to preserve the ability to mine user data for profit. If they put as much effort into security improvement as they do into protecting their intellectual property rights, hacking would be impossible. Early computer were effectively hack proof, because to change the software required access to the computer with a screwdriver. Software glitches in these systems really could be fixed by turning them off and on again. The fundamental weakness in modern computer systems is that they are built using self modifying code. The systems are allowed to download changes and include them in the running code. The code isn't even designed to be modular, as a way to limit the damage. Build hardware interlocks into systems to stop this and the hackers have nothing to hack. Even the read/write databases would be protected because the hackers have no way to illicitly access them without human intervention by an employee of the company. Unfortunately, the lack of attention to security issues has filtered into the firmware and the way the CPUs operate, making them vulnerable to attack. With millions of lines of code to exploit, hackers are looking for any poorly written section of code that can be turned to advantage, but even here, hardware interlocks could make the life of the hacker very difficult. There is a pervading philosophy that has grown up, that every part of a computer network should be accessible remotely, protected only by ever more complicated layers of software security controlled by software passwords. The weakness is clear, everything is software, and what has been written can be unpicked. The users have sacrificed security for the convenience of easy system updates. Worse still remote updates, which in the world of the internet means from anywhere in the world. Its time to lock down critical system with real hardware keys. Before anyone says software backup are the answer, I contend that given the level of integration of applications with the OS in modern system and the speed with which the OS itself changes. Backups cannot be the answer, unless a snap shot copy is taken of the whole system. Even then there are problems with applications having built in copy protection and the risk that the backup may well be already infected by a virus lying in wait for an event to activate it. Copies of only applications or OS are likely to fail due to version synchronise issues or failure to capture hardware driver elements. Even mismatched file time stamps can make a backup fail to work when it is reinstalled.
@gilkesisking most of the internet infrastructure already runs on Linux, so Linux alone is not a solution. A Harvard architecture that separates data from program software would certainly help.
@gilkesisking that explains it, you have a vested interest. Red Hat was once a free distro, shame those days are over. Linux will not solve the problem, particularly the networked element. There are understandable reasons why the administrators might want remote access and are not keen on hardware interlocks, not that that would be particularly easy with the Linux OS.
A lot actually, a compromise would back ROM disk. What is that new standard. Those en.m.wikipedia.org/wiki/M-DISC Yes, or drives with the same idea in mind. Most companies are going to invest in it. Even if they have the cash.
by Allowing BBC to film this video itself is a risk. They have broadcasted everything right from asset IDs tags, Host names. it is a gold mine for hackers.
Anyone else hear about this from the Security Now podcast in which Steve Gibson mentions this same incident? Just look at when that podcast was recorded and when this was uploaded, there is several days to weeks difference.
the answer is a 'hot' and 'cold' network that only talks to eachother via a manual user. hot is wan and cold is lan. treat hot like its diseased and cold will be safer to use. its much slower but safer
Met a man who claimed himself as "a hacker". Mansion home with elevator, Range Rovers, Billy Joel’s signatured grand piano, annual Halloween party budget: $1 million.
Why is his consulting firm not a decryption expert and why is he agreeing to negotiate with terrorists and pay the ransom? Wouldn't that be crazy if some of these firms actually deployed the malware and profit off the ransom and the consulting. I would expect a consulting firm to have decryption expertise instead of social engineer the business into paying the ransom. It's not impossible to decrypt the files if you have the right team to do it. The NSA has them.
It's very scary hacker's in Russia or north Korea or China are doing this...if you pay one time are they going to do it again of course they will...but I suppose it gets your business working again cause £45m is a lot of money to pay some hacker ...
The audio for this video was simply atrocious
Austin Fehrer piss take I thought my phone was broken 🥴
Austin Fehrer really? it’s fine for me
Yeah, true
Only Low IQ idiots are now the only people that can get a job with the British Brain Washing Corporation.
Sounds great on my Moto
Even the video audio was hacked!
Why is the audio split so horribly? With music in one ear and voice in the other?
J Broad 😂😂 thougt my headphones were screwed
Ok, good, I am not crazy.
Hackers Stole your audio engineer.
Ha! Same thought
My left ear is held ransom.
Agrees
damn hackers also hacked the audio going out from the company..
Fire your audio engineers
they hacked the audio channel
Really bad audio,
Who does the sound mixing for these videos ? It's never consistent, select both channels for the Love of my ears
painful audio
Really interesting video but please fix your directional audio
Audio is horrible
Someone put ransomware in my headphones.
Its just an op OpSec method of BBC. Make audio untraceable by hopping between audio endpoints. Not quite sure what it mitigates though...
@@kantnklaarwot
This is horrible audio. I expected more from BBC. ☠️😡😡
its free
The audio is unmixed. Not the first video from BBC news to be like this 😑
The audio in this video gave me brain cancer..
Mike Letterst awwwww poor little baby. Are you crying and complaining?
my head phones loved this....
Your headphones must love seeing your ears bleed
How do you manage to fuck up audio?
The audio had been hacked too
They really took advantage of left and right audio channels on this one
I thought my earphone was broken
Have they not heard of data backup?
So they can pay 45M to fix a ransomware attack but can't fix the horrible audio?
BBC didn’t pay anything you muppet.
@@megadave1197 And they never do, anyway. As a government entity, they just steal all their funding in the form of taxation.
BBC editors forgot how to do audio....
the audio editing on this vido is the worst iv ever seen
The audio is whack
Who was the sound engineer on this video??? WTF??? Seriously, WTF?
Sound from footage, back from the 1950s is better than this.
Whoever the sound engineer is, he/she needs to be sacked asap. This video shouldn't have even been uploaded with such bad audio.
Kudos for choosing to fix their system for $45 million rather than paying a few hundred thou for criminals
It's the princicple
Dude humility and integrity are luxuries some can not afford. Not out malicious for other. But necessary defense of them.
Thus company can afford it. Many more can not. No matter the causality.
doesn't work like that, do you think that even if they paid everything would be alright? they would ask for more the moment they paid, that is how scammers work.
@@hotsmine1573 Not always, frequently happens.
@@hotsmine1573 Not always if you read the news many institutions get hit, pay, and get their files back. For many, even if they have backups. Restoring the systems will cost 'more' than the ransom.
I just got up. I will post the examples when I get a chance.
Video has sound issues. Comments from the host are not audible
Do you guys need a freelance mix engineer ? Msg me..
Audio from left to right and vice versa wtf
I've edited a lot of videos, not professionally, but I'm still curious about how can you messed up audio channels in your workflow.
I thought my headphones are broken....AGAIN!
With a decent pair of headphones this is downright physically painful to listen to. Do you all use speakers or what?
Okey, Now I respect those old generation without computer doing all the paper work, yet able to getting Job done very efficiently
Paper and DVD-R records cannot be encrypted by hackers.
1. Isolate and backup critical data on a daily or weekly basis.
2. Print all orders and al invoices, as soon as they are received/issued.
How is it that these Companies have IT Departments that are so inept, that they don't back up files to an independent server.
Why the fuck was the audio split like that
Is it only me, but first I hear you only in my left ear, and then only in the right, using headphones, the music chanel is also for a short time on other ear
who the fuck did this audio.!!!!
Did the Audio got hacked too
Your audio isn’t good. 😑
how can bbc always mess up the audio
Lol know it
Diversity hires.
my right ear enjoyed this video
they need to get a new audio editor
They just need a new mic
Have the audio on both ears, not switching between the ears.
Why is the audio on this so bad
find them, and skin them alife, use a lot of salt before burning them well
left ear enjoyed
Worst audio ever
What's up with the audio?
Weekly manual back up, hard reset then install. Only down for one day.
keep an offline backup on linux, all the rest ghost machine. reset at the press of a button in the morning.
That is what I do but a lot of these systems are custom builds. Unique software. You would think they have burn once tech but do not.
Bbc try to hack Dolby effect in there videos🤣🤣
Did they hold your audio hostage for a ransom?
Sounds like these guys didn't pay for their last security update.
Most ransonware is caused by the unpatchable flaw called humans.
I don't know why they didn't just pay up.
Analogue operations will cost them more eventually.
@@wesalois The difficulty is that you don't even know if the bad guys can decrypt. There have been incidents in the past where poor code has made it imposible to reverse. Second you have proven yourself to be a target that pays, so why wouldn't they just wait and do it again.
Your Audio editor sucks, they should feel bad about it.
Any big company should have daily backups
Fix the damn audio!
I don’t see why loads of people are saying the audio was bad?
Because not as usual
You're probably not using a surround sound headset then. Mono audio presses the two audio channels together.
@@jbroad8194 You maybe right, Im using different channel for left & right and it sounds bad. maybe sounds good for mono.
Let me guess you have mono audio?
One of my ears is broken, I think?
The hackers are just taking advantages of the weaknesses that the software manufactures have built into modern computer systems. A whole industry has grown up to fix the security holes in poorly designed OS systems. For a fee, you can buy additional firewalls and virus killer software. These slow computer systems down trying to plug the leaks in the original OS software.
It is time for the software manufactures to bear the costs of the poor security of their products and it's under tested code often archaic code.
The software producers put backdoors into their code for their own commercial advantages. Computer operating systems need to be redesigned from the ground up to make them secure. It is perfectly possible to put hardware interlocks into computer systems to make the systems hack proof. This is not happening because the major OS manufactures want the ability to do remote system updates anytime they want. For PC users, the OS manufactures also want to preserve the ability to mine user data for profit.
If they put as much effort into security improvement as they do into protecting their intellectual property rights, hacking would be impossible. Early computer were effectively hack proof, because to change the software required access to the computer with a screwdriver. Software glitches in these systems really could be fixed by turning them off and on again. The fundamental weakness in modern computer systems is that they are built using self modifying code. The systems are allowed to download changes and include them in the running code. The code isn't even designed to be modular, as a way to limit the damage. Build hardware interlocks into systems to stop this and the hackers have nothing to hack. Even the read/write databases would be protected because the hackers have no way to illicitly access them without human intervention by an employee of the company. Unfortunately, the lack of attention to security issues has filtered into the firmware and the way the CPUs operate, making them vulnerable to attack. With millions of lines of code to exploit, hackers are looking for any poorly written section of code that can be turned to advantage, but even here, hardware interlocks could make the life of the hacker very difficult. There is a pervading philosophy that has grown up, that every part of a computer network should be accessible remotely, protected only by ever more complicated layers of software security controlled by software passwords. The weakness is clear, everything is software, and what has been written can be unpicked. The users have sacrificed security for the convenience of easy system updates. Worse still remote updates, which in the world of the internet means from anywhere in the world.
Its time to lock down critical system with real hardware keys.
Before anyone says software backup are the answer, I contend that given the level of integration of applications with the OS in modern system and the speed with which the OS itself changes. Backups cannot be the answer, unless a snap shot copy is taken of the whole system. Even then there are problems with applications having built in copy protection and the risk that the backup may well be already infected by a virus lying in wait for an event to activate it. Copies of only applications or OS are likely to fail due to version synchronise issues or failure to capture hardware driver elements. Even mismatched file time stamps can make a backup fail to work when it is reinstalled.
Empty words
@@chapmankol no an alternative solution to a real problem, which you clearly do not understand.
@gilkesisking most of the internet infrastructure already runs on Linux, so Linux alone is not a solution. A Harvard architecture that separates data from program software would certainly help.
@gilkesisking that explains it, you have a vested interest. Red Hat was once a free distro, shame those days are over. Linux will not solve the problem, particularly the networked element. There are understandable reasons why the administrators might want remote access and are not keen on hardware interlocks, not that that would be particularly easy with the Linux OS.
@Pichkalu Pappita Who is dumb enough to attack a network directly?
Why couldn’t I hear half off what was said?
That's why you don't expose your important systems to the internet
Um, things don't work that way.
@@TheGoodStink1 what do you mean
I am not an expert, but I am learning and relearning. It is not that simple.
@@Mecrom look up the CIA triad.
@@TheGoodStink1 Yes, i still don't understand what it is you are trying to tell me.
Reading the comments saddens me.. lets focus on whats ikportanr here.. these cyber attacks are disgraceful
I can't hear anything
Where can I find some technical details on how it got in and how they handle it?
search the internet
I’m glad they didn’t pay
RIP my ears
Bravo Hydro. Thank you.
Audio is not good
It's interesting that they relied on paperwork in storage. How many companies would not have that paperwork to rely on?
A lot actually, a compromise would back ROM disk. What is that new standard. Those en.m.wikipedia.org/wiki/M-DISC
Yes, or drives with the same idea in mind. Most companies are going to invest in it. Even if they have the cash.
by Allowing BBC to film this video itself is a risk. They have broadcasted everything right from asset IDs tags, Host names. it is a gold mine for hackers.
Left right left right. ( audio )
this is ear rape
Just wait til they develop paper hacking.
wth,, fix the horrendous audio !
no mention that the ransomware was developed by the NSA
“How do you feel when you pay 7 figures?”
“Not good”
Yeah no shit
why is this messing with audio?!
my left and right speakers are now separated and not united as they should be.
This is why bitcoin value goes up
Have fun auditing that
Who the fuck does the sound on this? This is not a Jimi Hendrix 1968 stereo LP.
great dub techno track at 2:57
Automation is cool but the damage that can be caused by hacking is devastating. Is no one seeing this in the government??
Anyone else hear about this from the Security Now podcast in which Steve Gibson mentions this same incident? Just look at when that podcast was recorded and when this was uploaded, there is several days to weeks difference.
Getting a salesman do some actual work for once is no bad thing so at least something good came of it.
Never let your WiFi and industry linked?????security fail greedy buggers.
the answer is a 'hot' and 'cold' network that only talks to eachother via a manual user.
hot is wan and cold is lan.
treat hot like its diseased and cold will be safer to use.
its much slower but safer
My god ! My ears!
Re locating a companies IT department to an off shore company is not such a good idea now is it.
Met a man who claimed himself as "a hacker". Mansion home with elevator, Range Rovers, Billy Joel’s signatured grand piano, annual Halloween party budget: $1 million.
Susan Diane Howell Big shoutout to cyberdesecurity on Instagram they are the G.O.A.T🐐🐐🐐🐐
Never pay.
AUDIO WTF!
:)
Right side=original
Left side = voice over
Am I right? XD
:)
Why the reporter is afraid?
Beware guys this type locks your files, and need money ransom to unlock them.
Good thing they had someone come in to make sandwiches because I don’t know what they would have done
Wonder if they were running Windows XP
Why is his consulting firm not a decryption expert and why is he agreeing to negotiate with terrorists and pay the ransom? Wouldn't that be crazy if some of these firms actually deployed the malware and profit off the ransom and the consulting. I would expect a consulting firm to have decryption expertise instead of social engineer the business into paying the ransom. It's not impossible to decrypt the files if you have the right team to do it. The NSA has them.
Lauren Big shoutout to cyberdesecurity on Instagram they are the G.O.A.T🐐🐐🐐🐐
It's very scary hacker's in Russia or north Korea or China are doing this...if you pay one time are they going to do it again of course they will...but I suppose it gets your business working again cause £45m is a lot of money to pay some hacker ...