Listen "What Actually Happens in a Ransomware Attack? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 4)"
Episode Synopsis
In this clip, Max Smeets walks us through a real-world example of how a ransomware attack unfolds — from the initial phishing email to the final ransom negotiations.It usually starts with a simple hook, like a fake Amazon gift card email, designed to get someone inside the organization to click. Once inside, attackers move laterally, using everyday tools already in the system — a tactic known as living off the land. Their goal is to reach critical systems and backups, staying hidden as long as possible.Eventually, they reveal themselves with a ransom note — not just demanding money, but proposing a business-like conversation. Discounts, cryptocurrency preferences, and even “customer service” come into play. But behind the scenes, it’s rarely the victim negotiating directly. Professional ransomware negotiators often step in, and in many cases, they’ve dealt with the attackers before.This clip offers a rare look at the detailed anatomy of a ransomware operation.Watch Full Episode: https://youtu.be/XXSIa5-exTI
More episodes of the podcast The Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri
The China vs India Conundrum: Inside Apple's Race to Exit China | Patrick McGee, FT (Ep. 40)
18/11/2025
Ep. 38 - Is Silicon Valley Changing the Defense Tech Industry? | ft. Michael Brown, Shield Capital
26/09/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.