Management of for-profit hospitals too. If you have no qualms asking people to foot bills in the hundreds of thousands of dollars, you should have a robust IT system too. Obviously not talking of public hospitals, which, it seems, are underfunded no matter which country they are in
it is, but i've set up a fair amount of systems for clinics and hospitals and they would never ever call me to finish my job resulting in their systems just barely being functional and very non secure. keep in mind that this wasn't done over them being cheap, but rather them thinking they have a functioning system in place so why bother? literally had to beg them to finish what i've started and none of them would even bother
@@ФеофанЭтополедолжнобытьзаполнеwell, hospitals are mostly for the sick and injured with only a small percentage of people going to a hospital being healthy and going there for a check or some test that ends up negative. So it's kinda obvious that any children's hospital will be full of sick children, lol.
A regional gas station/convenience store chain near me just experienced a multi-week systems outage. Everything from their label printers to their supply/stock ordering and rewards program was not functioning. Corporate has been tight lipped on the cause, but rumors have been circulating that they may have been ransomed.
Several server operators use 6+ monitors and 2 or more keyboards, albeit usually with each monitor connected to a server that's connected to a main server, with all of those being controlled with a single keyboard and mouse, with the other keyboard and mouse being connected to an offline PC next to them, so they can work on files without risking those files being accessed through the servers.
These Canadian Data breaches go deeper. Maximus Inc, the company contracted out by the Government is acutely aware of this. As a Canadian, my SIN has been stolen from the CRA three times in the last five years.
The data breaches are happening within the actual government. There is an error message they made to let you know your SIN has been sold on the Dark Web. Usually they use the CRA, but the government also uses the same company that has led to CRA breaches to also handle everything medical, as well social welfare.
What's crazy is that each person has an identifying number that cannot be changed. Like bro you guys gave me this stupid number at birth and tell me NEVER share it with anyone or it could ruin my life. But then I have to give it to some ransom old lady that works in accounting or I won't get a paycheck 😂
@@Nate_o_eight Out Healthcare numbers are also contracted out. I called about Ultrasound results, and the person I was speaking to didn't know the laws. I was speaking to an out of country call center, where I had to provide my name, SIN, health number, and Address, just to find out where my imaging ended up.
I've been on the disaster recovery team for a few ransomware attacks. The best defense against ransomware is to have airgapped backups. Take your backup and then REMOVE access to that backup from the network. That way if you ever do get your files encrypted, you just restore from that backup and close up whatever hole they came through. In the cases that I've worked on, there was no threat of releasing the data on the darkweb. The idea of paying the ransom was never even considered.
Companies being ashamed to admit they have had to pay a ransom reminds me of the infamous conman Victor Lustig, who once sold the Eiffel Tower to a gullible mark. When the mark went to the Paris police and they started investigating, they discovered ANOTHER man who had also "bought" the Eiffel Tower, but after he realised he had been conned he was so embarrassed he didn't tell anyone. Lustig escaped and went to America, where he managed to con no less a criminal figure than Al Capone himself, something I would have thought was extremely dangerous.
Strange coincidence! I just watched a video about different scams & that story was included(there is more than one conman that ran that scheme). As well as a guy who 'sold' the Brooklyn bridge dozens of times lol.
some months ago a college of mine with a business degree tried to convince me that cyber crime against businesses basically doesn't happen anymore because the security is too good. I was laughing then and I am still laughing now
YES ! you've made alot of really kickstarter scams cases videos, and they were literally like documentary's that were really well searched and put together, Making content about Blackhat / Greyhat / Whitehat stories would be so awesome !!!
@@ownedmaxer607 With the world's worst, most annoying voice delivery ever. And nowhere near the level of video editing and visuals presented on this channel.
@@albertawheat6832 Not sure what you mean, YT is an amazing learning resource. Probably the best resource aside from experiential learning. Stories like this are how I was even introduced to cyber, and they accelerated my learning by showing all of the possible routes that hackers and defenders can take.
It's pretty funny hearing people from other countries like Kira reacting with total bewilderment at the leniency of the Canadian justice system. People like Sebastián getting off with basically no consequences is the norm, not the exception. Just ask Carla Homolka.
Hey, they gave him 7 years, the same sentence for manslaughter in Canada. Canada doesn't want you in prison, they want you out there working and paying your taxes. 😅
It's more of a way of thinking. Like, the Canadian justice system favorizes rehabilitation. If it's possible for the person to become better, it's the priority
Tbf it's not that dissimilar in the UK where Kira's from, our justice system has a habit of letting people who commit horrendous crimes (e.g. murder) off with a slap on the wrist, while financial crimes get you close to life in prison
That was the most shocking part of the story. If he committed that exact same drug crime in the US, he would have already been jailed for 20 years, never been able to be employed by the federal government, and never would have had the ability to extort hospitals and businesses through ransomware.
I member the dude who landlorded and ran 50+ grow houses in B.C. (b4 legalization, circa 2008). Got muthafucking probation, like two years. LOL. In USA, that is not how it would've gone down. It was then I realized, how 'understanding' our neighbor to the North was.
Even if you pay the ransom there is no guarantee that they wont just copy the data and use it to blackmail you in the future. Cutting your losses is the only smart thing to do.
Not a guarantee, but a pretty high liklihood that they don't, as their entire business model relies on that trust. If they started leaking or selling info after you pay, people would stop paying. Pretty simple
Again, it isn't about goodwill. I'm not sure how else to explain to you if the simple explanation above didn't do it. Its just common sense that they do what is in their best interest, and leaking info after payment is the exact opposite of their best interest.
@@regenosis There was basically no risk. The accounting and customer data was encrypted using a usb key which they can’t access and the other files were just research and training files.
This dude not spending his money frivolously shows he was a cut above. Remember, people who spend big money on big stuff aren't really rich, they just have a temporarily-inflated liquidity. Real rich people hide their wealth.
Absolutely spot on. As they say - Poor people act rich. Rich people act poor. Nothing like having that £900 a month Range Rover on the drive, the £100 a month iPhone and the £1000 a month mortgage whilst you save £50 a month...
@@CyclistChrisy’all are ridiculous. Mark Zuckerberg and bill gates may not flaunt there wealth through clothes or cars but living in multi-million dollar mansions is not living like poor person
You're right, but they have a strong incentive to do it properly. Otherwise, they'll end up with the reputation of not being trustful and people won't pay their ransom, thus ending with the riskier, dirtier and harder job of selling whatever data they now have.
@Galuche1L1U I guess, but they could just claim that it wasn't their criminal organization, but rather an "imposter". I don't have a horse in the proverbial race. Just some thoughts. No honor among thieves and all that
@Galuche1L1U or they could just say that they breached their system, so it could be someone else did also, who isn't known in the equation and has remained silent
@@JK-gm6kkit wouldn’t matter what they would claim - if a company got hit by ransomware and data was released by any means it would still damage their reputation
We all wanna be rich, but attacking healthcare is bad. If I could extort all the companies that have extorted me over the years, then hell yeah, count me in 😮
Healthcare companies are the ones doing mass extortion. If you don't do exactly what they want, when they want you to do it, they will crush you. It's legalized protection racket. They have a state mandated monopoly and they know how to weaponize it.
I've been attacked by ransomware twice. Lucky for me i keep everything I do backed up on an external hard drive that only stays hooked up to the computer long enough to transfer files. I also don't keep digital files of personal information, nor do I save logins to my accounts. Both times i just reinstalled Windows and went about my day. Borderline luddite here.
Never forget that paying doesn’t gurantee you will get your files/systems unlocked. But it 100% means you will be considered a better target down the line coz you’ve shown you’d buckle and pay.
thats a double edge sword.. tho it ussaly results him the system getting unlocked for the same reason a s"cause they pay" if they pay and you don't unlock their shit then next time around they won't pay because you already proven that even if they pay it doesn't help them at all
False. Ransomware groups operate on reputation. If they ever fail to honor a deal, no one will ever even consider paying them again. Don't comment on things just to hear yourself speak, or see yourself type in this case.
@@ao1778 that is absolutely wrong.. there’s been a lot of RaaS that absolutely didn’t provide decryption keys even if you paid. For a very mainstream example just look at NotPetya, that actually asked for money and it was actually a wiper. Stop being an idiot and learn about the subject before you try to call out industry professionals, thanks.
Even after watching all these stories of Kira’s assorted degenerates, I am always amazed at people shown. This channel is the closes I get to “true crime” stuff.
What a coincidence that 1 guy was arrested...1 guy was also arrested by the FBI when they "investigated" the 2008 collapse of Wall Street... WELL DONE FELLAS!!
Good video, but I would have liked more info on how exactly he was caught. The "house of cards" section didn't go into any detail on how bringing down a website in Belarus somehow linked back to him, given how careful he apparently was. Anyway, I recently found your channel and am enjoying these dark web/cybercrime documentaries. I'd be glad for them to be even longer, but I realise how much work that must be! You probably won't ever read this, but if you do: keep up the great work!
My go to is letting law enforcement and the judge know that everything was just a prank. They always understand and we have a good laugh together. Little do they know, the prank was actually on them. I like to call it, prankception.
That’s crazy that the hacked the Toronto sick kids , I was born thier with a very unique heart condition was not meant to make it but they saved and I’m fully grown up now, that’s insane
These days part of me has to wonder, when I hear about a massive organized hacking operation originating in Russia that targets major businesses in the West and causes orders of magnitude more damage than the revenue it brings in, if this is more than just criminal.
Oh it probably is. What better way to disrupt competition? In the days of Sail we had privateers, allowed by a government to plunder another nations ships. This is just an extension of that. "You're going to do it anyway, so do it to our enemies, you get to keep what you get, and as long as you don't turn on us, we won't interfere"
it is probobly better that way even if things like this can happen bc this case is not really the norm and giving people short sentances for non-violent crimes as a general rule is prob beneficial to society. the american prison system is real bad and does a shit job at fixing crime, prison here encourages people to just continue a life of crime after they get out (it doesnt help that getting a job as a former prisoner is very difficult) we just have an enormous prison population that we (legally) use for slave labor. the best way to lower crime is to improve living conditions
I can't believe it was only 20 years - they could have got him for at least a thousand years probably - one count every time he did ANYTHING times 20 years per count. And he had a lot of victims. Plus they can usually tack on stuff like conspiracy and money laundering etc as bonus charges for just about any criminal activity.
ALWAYS keep an onsite and offsite backup with either incremental or differential backups. I would laugh so hard if this happens to me as it just disconnect ethernet cord, use secure erase on both HDD/SDD's, re-flash BIOS to be safe from rootkits and re-install OS.
Aha. And if a breach happened at your company with 50.000 machines, hundreds of servers and thousands of switches scattered across the world. You might not so easily be prone to laughter.
Also they still have your data which they will publish online for everybody to download, so hope you don't have any data you don't want everybody else to have.
@@LordZordid Again keep company differential/incremental backup of all PCs, Re-deploy all OS through PXE/SCCM or similar as well as reflash all bios with a custom script. Then hire a pen tester to see how they got in if it can't be determined. I wouldnt be sysadmin for a company that size so hypotheticals get you no where. All across the world; no what your referring to is hops across routers/switches and anything outside my demarc point wouldn't matter. Copying data takes time, quite a bit over a network that's probably had to hop across 100+ points. Taking then server offline for the company wouldn't be a big deal. Reinstall the OS offline, BIOS, then harden security.
@@bubba99009 If they managed to go undetected possibly, if they're able to do anything with it is different. Knock the server offline and switch to a Linux/other partition or live boot and use a decryptor or nuke the damn thing and start over with your backups and hire a pen tester. Idgaf about company data its not mine, I don't keep self ID'ing stuff on my PC and I have vast protections against digital fingerprinting.
i remember being a victim of cybercriminals, because of...boeing. yep, THAT boeing. however, once i've reached the threat part of the letter, i relaxed. the threat was absolutely laughable
“akes tens or hundreds of thousands selling drugs>get caught and goes to jail for a couple months and can still get a government job>does it again because why wouldn’t you? You can make your annual salary in a few months with a couple month vacation if you get caught. Zero repercussions for doing crime leads to more crime?!?!? Whaaaaaaaaat?
Incredible how he got off the hook easily from his trafficking charges and landed a job in the govt. Must be someone's son or nephew with a looooooooooot of pull.
My trucking company was just hit by this. We’re the number 1 privately owned trucking company in the USA. We didn’t pay. We’re down for a few weeks but still operating just the old school way. Now they told us to wait for something in the mail from a company telling us if our personal information was compromised and we will get a whopping 1 year of a free monitoring service. Ugh thanks
The main question is that why they don’t stop ?! If you already made a lot of money just disappear and launder your money and live the life quietly. But it seems that it’s just another kind of addiction.
I was involved in a Ransomware attack on a major fashion company. Here are a few funny/not so funny things from it.. We got hit with the ReEvil raas. When the insurance company brought in the FBI, all the FBI did was call the "company" behind the attack. They literally knew who they were, called them directly and negotiated a better price. Literally the FBI worked with them. Also.. its funny that the decryption tool was 1kb..
Whats messed up is that, the guy had good opportunities compared to many others who didn't and currently don't have, only to commit crimes by stealing. Makes no sense.
Considering how brazen they were, it was repeated many times and the societal impacts (especially healthcare related) - 20 years seems like a modest penalty to me. I would expect 40+ years.
A quick explanation for why he "somehow" got so little time. The Canadian justice system is essentially a revolving door and a slap on the wrist until it's too late.
Kira, just wondering, how much of the details are for storytelling, versus reality? Just out of curiosity, like the intro saying that his routine was a morning workout, a shower and a black cup of coffee? I appreciate the imagery regardless!
All RUclipsrs making vids like this have to add details like that to personalize the story. I mean be honest with yourself- is it that farfetched he was doing those exact activities in the AM like every other human? It helps make the story well rounded and relatable. Also adds time to the video which means more ad revenue lol.
yeah, i don't have a problem with youtubers putting their own bits in (see: coffeezilla, just skip the bits if you don't like them) but when they're told in the exact same format as facts of the case, it gets confusing. it's a super small detail but since we're talking about a real legal case, it makes it hard to understand what's real and what's storytelling. even just adding something like "he might have...." would make things clearer and he could still keep the longer run time.
@roguejones good point. "he might have" or something similar would signify that they're adding fluff/storytelling for the sake of transparency. but a lot of True Crime channels will just add some of the most random details that make it seem like they were in a shared household relationship with the killer, and it can cause quite the laugh at times 🤣
Looking at some of the people that have done large ransomware (or otherwise malicious) schemes, some of them look like they could be my doppelganger. Just suprised the gov hasn't looked into me....
This is why here in Australia we are looking at laws to make it illegal for companies to pay the ransom. It a somewhat easy way to slow this down. You make it a crime not to report the hacks and a crime to pay the ransom. You threaten the companies with multimillion dollar fines if they do pay
Guys who target healthcare or other life critical infrastructure should be charged with any deaths caused by their actions.
Management of for-profit hospitals too. If you have no qualms asking people to foot bills in the hundreds of thousands of dollars, you should have a robust IT system too.
Obviously not talking of public hospitals, which, it seems, are underfunded no matter which country they are in
I think big pharma kills way more people bro
Absolutely agreed
It should be seen as terrorism. it is what it is.
The Philippines just had their national health database have this happen.
8:49 targeting not just a hospital in general but a hospital for children is just vile.
It doesn't get any lower than that, absolutely disgusting
it is, but i've set up a fair amount of systems for clinics and hospitals and they would never ever call me to finish my job resulting in their systems just barely being functional and very non secure. keep in mind that this wasn't done over them being cheap, but rather them thinking they have a functioning system in place so why bother? literally had to beg them to finish what i've started and none of them would even bother
That's kinda scary@@blazeaster
@@ФеофанЭтополедолжнобытьзаполнеwell, hospitals are mostly for the sick and injured with only a small percentage of people going to a hospital being healthy and going there for a check or some test that ends up negative.
So it's kinda obvious that any children's hospital will be full of sick children, lol.
Get em Ethan!
Folks, don't commit crimes. The government absolutely hates competition.
FACTS
Especially the current Canadian government
This 👌👌
A regional gas station/convenience store chain near me just experienced a multi-week systems outage. Everything from their label printers to their supply/stock ordering and rewards program was not functioning. Corporate has been tight lipped on the cause, but rumors have been circulating that they may have been ransomed.
The moment i heard a man with 6 moniters and 2 Keyboards i Knew He was A Villain.
Yeah, a real bag guy..didn't even use a mouse.
there is a mouse lol @@w0ode198
Several server operators use 6+ monitors and 2 or more keyboards, albeit usually with each monitor connected to a server that's connected to a main server, with all of those being controlled with a single keyboard and mouse, with the other keyboard and mouse being connected to an offline PC next to them, so they can work on files without risking those files being accessed through the servers.
*monitors
@@w0ode198lmao
These Canadian Data breaches go deeper. Maximus Inc, the company contracted out by the Government is acutely aware of this. As a Canadian, my SIN has been stolen from the CRA three times in the last five years.
Feel bad for whoever bought my identity. Enjoy the debt, loser!
The data breaches are happening within the actual government. There is an error message they made to let you know your SIN has been sold on the Dark Web. Usually they use the CRA, but the government also uses the same company that has led to CRA breaches to also handle everything medical, as well social welfare.
What's crazy is that each person has an identifying number that cannot be changed. Like bro you guys gave me this stupid number at birth and tell me NEVER share it with anyone or it could ruin my life. But then I have to give it to some ransom old lady that works in accounting or I won't get a paycheck 😂
@@Nate_o_eight Out Healthcare numbers are also contracted out. I called about Ultrasound results, and the person I was speaking to didn't know the laws. I was speaking to an out of country call center, where I had to provide my name, SIN, health number, and Address, just to find out where my imaging ended up.
@@Nate_o_eight😢
Bro, you hit your stride. All your videos this past run have been structured, effective bangers.
What a great compliment
plot twist: Arthur was behind the attack which he used to justify his job position and secure a bonus.
HAHA that's twisted. If only he stopped there.
I've been on the disaster recovery team for a few ransomware attacks. The best defense against ransomware is to have airgapped backups. Take your backup and then REMOVE access to that backup from the network. That way if you ever do get your files encrypted, you just restore from that backup and close up whatever hole they came through. In the cases that I've worked on, there was no threat of releasing the data on the darkweb. The idea of paying the ransom was never even considered.
Are there any good RUclips guides on ways to do this?
It is actually a very good thing to do, even in a world without criminals we want data Ifrastructure to have redundancies
@@Max-zx4tpas an average consumer, I personally use an external hard drive.
what about rootkits?
@@Max-zx4tp Do you need someone to tell you how to remove a plug from a socket? 😂
Companies being ashamed to admit they have had to pay a ransom reminds me of the infamous conman Victor Lustig, who once sold the Eiffel Tower to a gullible mark. When the mark went to the Paris police and they started investigating, they discovered ANOTHER man who had also "bought" the Eiffel Tower, but after he realised he had been conned he was so embarrassed he didn't tell anyone. Lustig escaped and went to America, where he managed to con no less a criminal figure than Al Capone himself, something I would have thought was extremely dangerous.
Strange coincidence! I just watched a video about different scams & that story was included(there is more than one conman that ran that scheme).
As well as a guy who 'sold' the Brooklyn bridge dozens of times lol.
@@snooganslestat2030 Someone - it might have been Victor Lustig - almost managed to sell the Statue of Liberty.
@@zh84 that is WILD, paging KiraTV for that sweet sweet mini doc!!!
Ah the same man who scam people with the fake counterfeit printing machine. Lol just heard that story recently
There’s one literally funny guy.
long time listener first time caller. Love the show
so true.im from south Africa
@@jiteshmaharaj2961nice
@@jiteshmaharaj2961okay?
some months ago a college of mine with a business degree tried to convince me that cyber crime against businesses basically doesn't happen anymore because the security is too good. I was laughing then and I am still laughing now
Lol thats funny. At this point I think every college student should take an intro to cybersecurity course.
Proving, once again, those who cannot do...teach.
"One slip-up from anybody else in the whole organization and you could be the one paying the price." Karmically, also how ransomware works.
YES ! you've made alot of really kickstarter scams cases videos, and they were literally like documentary's that were really well searched and put together,
Making content about Blackhat / Greyhat / Whitehat stories would be so awesome !!!
as a security analyst, this is one of the first videos I would show to somebody to teach them about cybersecurity
@@ownedmaxer607 With the world's worst, most annoying voice delivery ever. And nowhere near the level of video editing and visuals presented on this channel.
And... you are a analyst ?? Why would you have to teach them by way of you tube ???
@@albertawheat6832 Not sure what you mean, YT is an amazing learning resource. Probably the best resource aside from experiential learning. Stories like this are how I was even introduced to cyber, and they accelerated my learning by showing all of the possible routes that hackers and defenders can take.
@@albertawheat6832 Because he is 12 years old 🤣
It's pretty funny hearing people from other countries like Kira reacting with total bewilderment at the leniency of the Canadian justice system. People like Sebastián getting off with basically no consequences is the norm, not the exception. Just ask Carla Homolka.
Hey, they gave him 7 years, the same sentence for manslaughter in Canada. Canada doesn't want you in prison, they want you out there working and paying your taxes. 😅
It's more of a way of thinking. Like, the Canadian justice system favorizes rehabilitation. If it's possible for the person to become better, it's the priority
Tbf it's not that dissimilar in the UK where Kira's from, our justice system has a habit of letting people who commit horrendous crimes (e.g. murder) off with a slap on the wrist, while financial crimes get you close to life in prison
That was the most shocking part of the story. If he committed that exact same drug crime in the US, he would have already been jailed for 20 years, never been able to be employed by the federal government, and never would have had the ability to extort hospitals and businesses through ransomware.
I member the dude who landlorded and ran 50+ grow houses in B.C. (b4 legalization, circa 2008). Got muthafucking probation, like two years. LOL. In USA, that is not how it would've gone down. It was then I realized, how 'understanding' our neighbor to the North was.
A great way to wind down the work week: Deep Dive Kira.
this guy is fucken to good just like me hahaha
Even if you pay the ransom there is no guarantee that they wont just copy the data and use it to blackmail you in the future. Cutting your losses is the only smart thing to do.
Not a guarantee, but a pretty high liklihood that they don't, as their entire business model relies on that trust. If they started leaking or selling info after you pay, people would stop paying. Pretty simple
I'm sure believing in the good will of a criminal will work out well for everyone.@@KiraTV1
Again, it isn't about goodwill. I'm not sure how else to explain to you if the simple explanation above didn't do it. Its just common sense that they do what is in their best interest, and leaking info after payment is the exact opposite of their best interest.
@@KiraTV1 this plus they usually have too many "customers" to give a sh*t about a single company
Wow I cant belive Linus Sebastian could ever do such a thing
Nothing surprises me anymore after he admitted to dropping hard r's
Absolutely love your videos. Nobody else is talking about these topics. Please don't stop any time soon. ❤
okay i wont stop bro..im from south Africa
Kira is a man of culture I see, using CityState 2 music in his vid was an unexpected surprise but a welcome one. Wasn’t expecting that at all.
Awesome work as always kira. Keep it up ma man, stay healthy.
My company actually was attacked by a ransomware but fortunately we had taken a backup 2 days earlier and we just ignored them and restored the files.
But it's not just about not being able to get at your files. They could very easily use your data against you.
@@regenosis There was basically no risk.
The accounting and customer data was encrypted using a usb key which they can’t access and the other files were just research and training files.
Hey, how did you back up your files? Did you use OneDrive or something similar? I'm thinking of doing it for myself
@@cjoshy I just had a backup on an external drive
I do it regularly to have a second copy of the files in case i ever need it
This dude not spending his money frivolously shows he was a cut above. Remember, people who spend big money on big stuff aren't really rich, they just have a temporarily-inflated liquidity. Real rich people hide their wealth.
Absolutely spot on. As they say - Poor people act rich. Rich people act poor.
Nothing like having that £900 a month Range Rover on the drive, the £100 a month iPhone and the £1000 a month mortgage whilst you save £50 a month...
Yeah, real rich people hide their money ...instead of having it in piles and boxes in their house 😂
@@CyclistChrisy’all are ridiculous. Mark Zuckerberg and bill gates may not flaunt there wealth through clothes or cars but living in multi-million dollar mansions is not living like poor person
Money talks, wealth whispers
But the joke is that's one of the reasons he got sentenced to the max sentence lol!
If it exists, theres a special place in hell for those that attack a healthcare organization with ransomware.
Another excellent audiobook by KiraTV, featuring impeccable research, writing, and narration.
You have to trust the exploiter, that he isn't going to turn around and leak your info, even after you've paid. Screw that
You're right, but they have a strong incentive to do it properly. Otherwise, they'll end up with the reputation of not being trustful and people won't pay their ransom, thus ending with the riskier, dirtier and harder job of selling whatever data they now have.
@Galuche1L1U I guess, but they could just claim that it wasn't their criminal organization, but rather an "imposter". I don't have a horse in the proverbial race. Just some thoughts. No honor among thieves and all that
@Galuche1L1U or they could just say that they breached their system, so it could be someone else did also, who isn't known in the equation and has remained silent
@@JK-gm6kkit wouldn’t matter what they would claim - if a company got hit by ransomware and data was released by any means it would still damage their reputation
We all wanna be rich, but attacking healthcare is bad. If I could extort all the companies that have extorted me over the years, then hell yeah, count me in 😮
Healthcare companies are the ones doing mass extortion. If you don't do exactly what they want, when they want you to do it, they will crush you. It's legalized protection racket. They have a state mandated monopoly and they know how to weaponize it.
Thank you Kira!
Shoulda known he was Canadian with all those polite ransom messages.
I've been attacked by ransomware twice. Lucky for me i keep everything I do backed up on an external hard drive that only stays hooked up to the computer long enough to transfer files. I also don't keep digital files of personal information, nor do I save logins to my accounts. Both times i just reinstalled Windows and went about my day. Borderline luddite here.
Kira you always make very good mini documentaries.
A new Kira video just in time for my lunch break
Mum wake up, Kira just uploaded
This an the babe wake up, such an such posted is more cringe than the fun fact ppl
Yahushua is Yahuah
@@honorablegent1201 Yahushua is Yahuah
"If there was certainty..."
If there were, my friend, if there were
Subjunctive mood shall remain
Never forget that paying doesn’t gurantee you will get your files/systems unlocked. But it 100% means you will be considered a better target down the line coz you’ve shown you’d buckle and pay.
thats a double edge sword.. tho it ussaly results him the system getting unlocked for the same reason a s"cause they pay" if they pay and you don't unlock their shit then next time around they won't pay because you already proven that even if they pay it doesn't help them at all
False. Ransomware groups operate on reputation. If they ever fail to honor a deal, no one will ever even consider paying them again. Don't comment on things just to hear yourself speak, or see yourself type in this case.
@@ao1778 that is absolutely wrong.. there’s been a lot of RaaS that absolutely didn’t provide decryption keys even if you paid. For a very mainstream example just look at NotPetya, that actually asked for money and it was actually a wiper.
Stop being an idiot and learn about the subject before you try to call out industry professionals, thanks.
Very polished and thoroughly processed video essay, you are really capable of pushing out one of the best types of documentaries I have ever seen.
8:20, No they weren't lucky. They were smart enough to pay for an expert to prepare them for this event.
Even after watching all these stories of Kira’s assorted degenerates, I am always amazed at people shown. This channel is the closes I get to “true crime” stuff.
Really well-done videos, thanks Kira.
What a coincidence that 1 guy was arrested...1 guy was also arrested by the FBI when they "investigated" the 2008 collapse of Wall Street... WELL DONE FELLAS!!
This may be my favourite clip pf yours of all time. Very very very well made. Thanks man.
Me in a hoodie in a dark warm room watching this video cause it’s 36 degrees outside
don't forget your face warmer (guy Fawkes mask)
So many people making over dramatic documentaries but this, this was fantastic! Subscribed
This one was really good. Thanks.
Fantastic work Kira. I really enjoyed watching this.
In 2021 I got attacked by ransomware.....lost all my files.
Amazing video Kira, you are so underrated !
Very interesting and well made video!
Just found your channel and I love it, from the way you break things down to how its so well put together.. awesome work man
Good video, but I would have liked more info on how exactly he was caught. The "house of cards" section didn't go into any detail on how bringing down a website in Belarus somehow linked back to him, given how careful he apparently was. Anyway, I recently found your channel and am enjoying these dark web/cybercrime documentaries. I'd be glad for them to be even longer, but I realise how much work that must be! You probably won't ever read this, but if you do: keep up the great work!
I cant believe this whole episode wasnt a "compooper saftee" advertisement.
I like you, you're my friend now.
@@LiftUpYourEyes Thank God.
As long as he still has money hidden away somewhere, what does he have to fear from being jailed? He'll get out and then continue living lavishly.
Amazing video about a complete scumbag and his scumbag crew. Can't believe these people targeted hospitals and places like that. Top notch production.
My go to is letting law enforcement and the judge know that everything was just a prank. They always understand and we have a good laugh together. Little do they know, the prank was actually on them. I like to call it, prankception.
You are the man!
19:09 My ADHD loves this honeycomb format you do for storytelling the actors/involved!
another great kira video, thank you!
This is the song that never ends; it just goes on and on, my friends...
That’s crazy that the hacked the Toronto sick kids , I was born thier with a very unique heart condition was not meant to make it but they saved and I’m fully grown up now, that’s insane
What's up with so much grifting cases in Quebec? I mean, I live here so it doesn't surprise me, just odd that there's been a few cases now lol
These days part of me has to wonder, when I hear about a massive organized hacking operation originating in Russia that targets major businesses in the West and causes orders of magnitude more damage than the revenue it brings in, if this is more than just criminal.
Oh it probably is. What better way to disrupt competition? In the days of Sail we had privateers, allowed by a government to plunder another nations ships. This is just an extension of that. "You're going to do it anyway, so do it to our enemies, you get to keep what you get, and as long as you don't turn on us, we won't interfere"
Seems like Canada is like we’ll give you another chance don’t worry about, and the US is like nah 20 years
it is probobly better that way even if things like this can happen bc this case is not really the norm and giving people short sentances for non-violent crimes as a general rule is prob beneficial to society. the american prison system is real bad and does a shit job at fixing crime, prison here encourages people to just continue a life of crime after they get out (it doesnt help that getting a job as a former prisoner is very difficult) we just have an enormous prison population that we (legally) use for slave labor. the best way to lower crime is to improve living conditions
I can't believe it was only 20 years - they could have got him for at least a thousand years probably - one count every time he did ANYTHING times 20 years per count. And he had a lot of victims. Plus they can usually tack on stuff like conspiracy and money laundering etc as bonus charges for just about any criminal activity.
3 years for all that crime? He def became an informant
16:07 He lived in a modest house still, but that wasn’t snow on his roof it was cocaine!
ALWAYS keep an onsite and offsite backup with either incremental or differential backups. I would laugh so hard if this happens to me as it just disconnect ethernet cord, use secure erase on both HDD/SDD's, re-flash BIOS to be safe from rootkits and re-install OS.
Aha. And if a breach happened at your company with 50.000 machines, hundreds of servers and thousands of switches scattered across the world. You might not so easily be prone to laughter.
Also they still have your data which they will publish online for everybody to download, so hope you don't have any data you don't want everybody else to have.
@@LordZordid Again keep company differential/incremental backup of all PCs, Re-deploy all OS through PXE/SCCM or similar as well as reflash all bios with a custom script. Then hire a pen tester to see how they got in if it can't be determined. I wouldnt be sysadmin for a company that size so hypotheticals get you no where. All across the world; no what your referring to is hops across routers/switches and anything outside my demarc point wouldn't matter.
Copying data takes time, quite a bit over a network that's probably had to hop across 100+ points. Taking then server offline for the company wouldn't be a big deal. Reinstall the OS offline, BIOS, then harden security.
@@bubba99009 If they managed to go undetected possibly, if they're able to do anything with it is different. Knock the server offline and switch to a Linux/other partition or live boot and use a decryptor or nuke the damn thing and start over with your backups and hire a pen tester. Idgaf about company data its not mine, I don't keep self ID'ing stuff on my PC and I have vast protections against digital fingerprinting.
He was a very smart criminal, but in the end it fell apart on him, as is always the case
Except when it dosnt.
Going after hospitals is really low.
Have to give the man credit though, everyone should strive to be the best in their field and he was.
stupid comment.
Your videos are mint! I don't understand why you don't have more subscribers.
Excellent video
Quebec, once again proudly leading the way for all Canadians.
You and Alberta. I live in Ontario and we are just followers. 🤫😆
Well, thats my evening sorted.
When there is darkness,there always be light...it may be grey light but the light will overcome the darkness....
i remember being a victim of cybercriminals, because of...boeing. yep, THAT boeing. however, once i've reached the threat part of the letter, i relaxed. the threat was absolutely laughable
That was a really good video. thank you
Crazy that if he had just gotten his own ego out of the way, he’d be set for life.
Got it !!! been bugging me how your voice sounds so familiar . You sound so similar to Brian Cox
Thanks for reminding me to back up my computer
great video. really enjoyed this.
Canada: 7 years, eh? that seems fair.
USA: dammit Canada. Give him to us. 20 years is his sentence.
“akes tens or hundreds of thousands selling drugs>get caught and goes to jail for a couple months and can still get a government job>does it again because why wouldn’t you? You can make your annual salary in a few months with a couple month vacation if you get caught.
Zero repercussions for doing crime leads to more crime?!?!? Whaaaaaaaaat?
Ransomware on a hospital is not very cash money.
Incredible how he got off the hook easily from his trafficking charges and landed a job in the govt. Must be someone's son or nephew with a looooooooooot of pull.
Got even a sliver of evidence for that?
You’d be surprised. There are mayors in the US that are currently serving that were arrested for breaking into cars in 2016.
My trucking company was just hit by this. We’re the number 1 privately owned trucking company in the USA. We didn’t pay. We’re down for a few weeks but still operating just the old school way. Now they told us to wait for something in the mail from a company telling us if our personal information was compromised and we will get a whopping 1 year of a free monitoring service. Ugh thanks
The main question is that why they don’t stop ?! If you already made a lot of money just disappear and launder your money and live the life quietly. But it seems that it’s just another kind of addiction.
"We do not accept English speaking users" - that's a weird condition. Doesn't say you have to speak Russian - just that you can't speak English.
Yeah wondering if that’s a translation mistake…considering it’s in English.
I was involved in a Ransomware attack on a major fashion company. Here are a few funny/not so funny things from it.. We got hit with the ReEvil raas. When the insurance company brought in the FBI, all the FBI did was call the "company" behind the attack. They literally knew who they were, called them directly and negotiated a better price. Literally the FBI worked with them. Also.. its funny that the decryption tool was 1kb..
Whats messed up is that, the guy had good opportunities compared to many others who didn't and currently don't have, only to commit crimes by stealing. Makes no sense.
Love these videos
I work for a bank and we backup everything daily luckily. We'd just pull it and be back within a couple hours most.
Considering how brazen they were, it was repeated many times and the societal impacts (especially healthcare related) - 20 years seems like a modest penalty to me. I would expect 40+ years.
good story thanks for telling bro💯💯
I see picture, I be like, Leave eric forman alone from that 70's show.
Never thought of my computer demanding paid bitcoin as a ransom by a hacker
lmfaoo
A quick explanation for why he "somehow" got so little time. The Canadian justice system is essentially a revolving door and a slap on the wrist until it's too late.
Why did the guy never get cought?
He ransomware.
Hahahahahahaha that was good. Well.played
Kira, just wondering, how much of the details are for storytelling, versus reality? Just out of curiosity, like the intro saying that his routine was a morning workout, a shower and a black cup of coffee? I appreciate the imagery regardless!
All RUclipsrs making vids like this have to add details like that to personalize the story. I mean be honest with yourself- is it that farfetched he was doing those exact activities in the AM like every other human? It helps make the story well rounded and relatable. Also adds time to the video which means more ad revenue lol.
yeah, i don't have a problem with youtubers putting their own bits in (see: coffeezilla, just skip the bits if you don't like them) but when they're told in the exact same format as facts of the case, it gets confusing. it's a super small detail but since we're talking about a real legal case, it makes it hard to understand what's real and what's storytelling. even just adding something like "he might have...." would make things clearer and he could still keep the longer run time.
@roguejones good point. "he might have" or something similar would signify that they're adding fluff/storytelling for the sake of transparency. but a lot of True Crime channels will just add some of the most random details that make it seem like they were in a shared household relationship with the killer, and it can cause quite the laugh at times 🤣
Even Kira refuses to upgrade to Windows 11
Looking at some of the people that have done large ransomware (or otherwise malicious) schemes, some of them look like they could be my doppelganger. Just suprised the gov hasn't looked into me....
This is why here in Australia we are looking at laws to make it illegal for companies to pay the ransom. It a somewhat easy way to slow this down. You make it a crime not to report the hacks and a crime to pay the ransom. You threaten the companies with multimillion dollar fines if they do pay
Australia sounds cucked