What Actually Happens in a Ransomware Attack? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 4)

02/06/2025 5 min

Listen "What Actually Happens in a Ransomware Attack? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 4)"

Episode Synopsis

In this clip, Max Smeets walks us through a real-world example of how a ransomware attack unfolds — from the initial phishing email to the final ransom negotiations.It usually starts with a simple hook, like a fake Amazon gift card email, designed to get someone inside the organization to click. Once inside, attackers move laterally, using everyday tools already in the system — a tactic known as living off the land. Their goal is to reach critical systems and backups, staying hidden as long as possible.Eventually, they reveal themselves with a ransom note — not just demanding money, but proposing a business-like conversation. Discounts, cryptocurrency preferences, and even “customer service” come into play. But behind the scenes, it’s rarely the victim negotiating directly. Professional ransomware negotiators often step in, and in many cases, they’ve dealt with the attackers before.This clip offers a rare look at the detailed anatomy of a ransomware operation.Watch Full Episode: https://youtu.be/XXSIa5-exTI

More episodes of the podcast The Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri