dot com: The Hacking – 4 Part Series
Click to review descriptions of all four episodes
Is the post-Cold War era over? In this brave new world, nothing is too small, or big, to be digitalised…including acts of war. Russian ransomware attacks almost doubled last year. At this very moment, cybercriminals are crippling schools, supermarkets, dentists, kindergartens, hospitals, oil pipelines – all in the name of money. Katie Puckrik wants to know who, and why.
Part 1: You’d think healthcare would be a no-go. You’d hope that, surely, even Russian cybercriminals have their moral boundaries. But you have no idea the lengths they’ll go to for money. This is the story of how the world’s oldest maternity hospital, Dublin’s Rotunda Hospital, was crippled with a single email and forced to revert to pens and paper.
Part 2: It’s not just cybercriminals who hack. In February 2022 Russia invades Ukraine, and a few months later someone leaks 60,000 private messages from one of the world’s most complex, ruthless and profitable Russian ransomware gangs, alongside a post ‘Glory to Ukraine!’ The findings – what they reveal about who these hackers are, how they recruit, and how they choose victims – are incendiary.
Part 3: Psychological pressure…that’s what ransomware is all about. Holiday weekends and Fridays are prime time for ransomware attacks, and on Friday 2nd July 2021 Robert Cioffi was looking forward to celebrating Independence Day with his family. But soon he’d be caught up in the biggest single ransomware attack to date, that would have a disastrous domino effect on up to 2000 businesses worldwide: kindergartens in New Zealand, dental practices in the US, supermarkets in Sweden.
Part 4: Ransomware gangs don’t just go for the big fish. Kareem grew up on the West Side of Chicago in a neighbourhood woven with a pattern of guns, drugs and violence; until Lincoln College – a tiny place, one of the US’s only Predominantly Black Institutions – turns his life around. But in December 2021, ransomware comes to town. Plus: Katie meets Barack Obama’s ex-Special Advisor for Cybersecurity, who finally untangles the question that’s been bugging her…why Russia?
The Best Definition of Ransomware Ever | Ryan Chapman
April 4, 2022, Tech & Main hosted by Shaun St.Hill
Today, we will be talking with our good friend, Ryan Chapman. He is a Principal Incident Response & Forensic Consultant for Blackberry (yes, that Blackberry!). Listen as Ryan gives the most complete answer ever to the question, What is ransomware? In addition to the answer, we give a super detailed example of what ransomware looks like for a one-person IT department.
Direct link: https://anchor.fm/techandmain/episodes/The-Best-Definition-of-Ransomware-Ever–Ryan-Chapman-e1gkfuv
What is Incident Response?
September 1, 2021, I Like to Hack Things hosted by Valcan_K
What’s up #SecurityNinjas! Have you ever heard of Incident Response? Incident Response is a very important career field within cybersecurity, and it can be a lot of fun. I had the opportunity to speak with Ryan Chapman about his many years of experience in Incident Response and cybersecurity. Ryan provides a ton of good information about skills, and some insights into the job interview process.
You’re Not Really Ready for Ransomware
- August 4, 2021, Recorded Future Podcast
Mythical Malware Analysis
- May 9, 2021, Positively Blue Team podcast hosted by BSDBandit and Understudy77
Tonight is part one of what I’m sure will be a whole series with the wonderful Ryan Chapman (rj_chap) and Mobius (@MalwareMobius) where we start to dig into the fundamentals of malware and malware analysis. Join us for this whole new world!
Ask Us Anything! Cyber Defense Live Q&A #2 – 05/07/2021
- May 7, 2021, Blueprint Podcast Presented by John Hubbard
Come join Blueprint Podcast host John Hubbard, Justin Henderson, and a rotating cast of cyber defense and blue team expert guests in an informal hangout driven by, and based entirely on your questions! Anything goes – cyber defense, incident response, ransomware, APTs, threat intel, SOC management, defensive tools, analysis techniques and more! Hit the chat room and let us know what’s on your mind!
Don’t forget to subscribe to Blueprint here or where ever you listen to podcasts!
SOC X – The Special
- April 12, 2021, Positively Blue Team podcast hosted by BSDBandit and Understudy77
Welcome all to the first Positively Blue Team Special, every so often something happens that shines a spotlight on the world of the defenders and people in DFIR, and when those things come to the forefront we want to talk about them. So tonight we are here to talk about the SOC X World Championships (socx.io) which consisted of 50 teams coming from multiple parts of the world and industries all competing against each other for the title of SOC World Champion.
Join us with the folks who put it on from Recon Infosec (Whitney Champion -@shortxstack, Eric Capuano – @eric_capuano, and Samuel – @Valcan_K) and some folks from the winning team at Blackberry (Ryan Chapman – @rj_chap and Codi) as we go through the ins and outs of the competition, some of the scenarios, and advice for future competitors. This is a long one so buckle in and enjoy!
Direct link: https://podcasts.apple.com/us/podcast/soc-x-the-special/id1554774288?i=1000516734533
The Blue Teamer’s Blueprint for Malware Triage
- March 30, 2021, SANS Blueprint Podcast hosted by John Hubbard
Even if you’re not a malware analyst, any blue teamer should be able to do some initial basic malware sample triage. The good news is that this is quite easy to do using freely available tools once you know what is available. Join John in this conversation with Ryan Chapman as they discuss how to reverse engineer malware and why you might want to do so.
Direct link: https://www.sans.org/blueprint_podcast/blue-teamers-blueprint-for-malware-triage-with-ryan-chapman?msc=blueprint-podcast-detail-lp
Anatomy of a Breach
November, 2020, InSecurity podcast with Matt Stephenson
When is a breach a breach? When is it a data leak? When is it simply a server left exposed? On this edition of InSecurity, Matt Stephenson talks with veteran Incident Response Consultants John Wood and Ryan Chapman about what happens once the bad guys break in and what the good guys can and must do when dealing with the results of a cyber-attack. Plus: PORT 3389! Dig it…
Direct link: https://podcasts.apple.com/us/podcast/ryan-chapman-and-john-wood-anatomy-of-a-breach/id1260714697?i=1000496984648
The Computer Incident Response Team (CIRT) Role
November, 2020, Cybersecurity Innovation Podcast hosted by Cody Hackett
Ryan Chapman is a very seasoned information security professional with experience across multiple domains like technical training, hands-on incident response, and security operations.
In this episode, we learn from Ryan about the role of a CIRT team, day in the life of an incident response analyst, red/blue/purple teaming, and all other general topics related to information security.
Direct link: https://podcasts.apple.com/us/podcast/ryan-chapman-on-computer-incident-response-team-cirt/id1460834003?i=1000440078537
Surf Kahuna (part 1) – Origin story of a Digital Forensic Incident Responder (DFIR)
July 24, 2022, AOL Underground hosted by Steve Stonebraker
Surf Kahuna (Ryan Chapman) shares his origin story about a series of events that occurred on AOL that rocked his world and led him down the path of digital forensics.
Surf Kahuna (Ryan Chapman) finishes his origin story and what he learned from it. Then Steve and Ryan talk espionage, multiple Advanced Persistent Threats, retro gaming, password spraying, ransomware, and what has helped Ryan be successful in Infosec.
WARNING!! This podcast includes NSFW language! I debated putting this on my Website. I cursed more than a sailor. These two episodes for the AOL Underground podcast were meant to be “underground.” I was speaking to my former fellow hackers from the America Online “scene,” as we called it. This is not meant to be a professional podcast. But the story ended up being so deep and important to me that I’m posting here. We may re-record a SFW version later.