logo
episode-header-image
Feb 2022
24m 30s

Relentless Replicants

Red Hat
About this episode

Computer viruses and worms haunt the internet. They worm their way into a system, replicate, and spread again. It’s a simple process—with devastating consequences. But there’s a whole industry of people that rose up to fight back. 

Craig Schmugar recalls how he and his team responded to MyDoom, one of the fastest-spreading worms ever. Dr. Nur Zincir-Heywood reveals the inner workings of viruses and worms, and how they draw their names from the world of biology. And security expert Mikko Hypponen shares advice on avoiding malware. But he also warns that we’re in an arms race against malware developers.

If you want to read up on some of our research on viruses and worms, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.

 

 

Up next
May 2022
All Together Now
Our show is all about heroes making great strides in technology. But in InfoSec, not every hero expects to ride off into the sunset. In our series finale, we tackle vulnerability scans, how sharing information can be a powerful tool against cyber crime, and why it’s more importan ... Show More
23m 18s
May 2022
Invisible Intruders
What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a newer threat—cyber-espionage. This led the eclectic astronomer-cum-systems administrator to create what we know today as intrusion d ... Show More
22m 18s
May 2022
Ruthless Ransomers
It’s a strange situation when someone can hold something hostage from halfway around the world. It’s tragic when your own pictures and files are remotely encrypted. But when it’s a hospital’s system? Ransomware becomes a problem about life or death. Eddy Willems recounts his invo ... Show More
22m 8s
Recommended Episodes
Jun 2021
The booming ransomware business
Hackers are making millions from ransomware attacks. What can be done to stop them? Ed Butler speaks to professional ransomware negotiator Kurtis Minder, about the increasing professionalisation of the ransomware business. Kimberly Grauer, head of research at Chainalysis explains ... Show More
18m 19s
Nov 2021
Trojan Source--a threat to the software supply chain. Ransomware goes to influence operations school. Triple extortion? Criminal target selection.
Researchers describe Trojan Source, a hard-to-detect threat to the software supply chain. A ransomware gang takes a page from the information operator’s book. From double extortion to triple extortion, as other ransomware gangs add distributed denial-of-service to encryption and ... Show More
27m 56s
Nov 2018
How a long-forgotten virus could help us solve the antibiotics crisis | Alexander Belcredi
Viruses have a bad reputation -- but some of them could one day save your life, says biotech entrepreneur Alexander Belcredi. In this fascinating talk, he introduces us to phages, naturally-occurring viruses that hunt and kill harmful bacteria with deadly precision, and shows how ... Show More
11m 13s
Aug 2017
The Roots of Evil
WannaCry’s widespread cyber attack on more than 200,000 computers all over the world made headlines – but only a few people remember a similar attack, named The AIDS Trojan, almost 30 years earlier… In this episode of Malicious Life, we go deep into the world of ransomware to exa ... Show More
30m 22s
Jan 2024
Vulnerabilities and security risks.
Ivanti products are under active zero-day exploitation. Phemedrone is a new open-source info-stealer. Bishop Fox finds exposed SonicWall firewalls. GitLab and VMware patch critical vulnerabilities. The Secret Service foils a phishing scam. Europol shuts down a cryptojacking campa ... Show More
32m 50s
Nov 2023
Navigating Threats in the Digital World
Dr. Phil and his esteemed guests dive into the ominous landscape of the internet, exploring the surge in illicit activities, scams, and cyber threats. They focus on revenge porn, the dark web, and online fraud, where dangers lurk behind every click.  As we navigate the complex we ... Show More
53m 7s
Dec 2023
The United Kingdom's catastrophic ransomware attack.
The UK faces a looming threat of a catastrophic ransomware attack. The Senate confirms a new National Cyber Director. The rivalry between malware groups BatLoader and FakeBat. BazarCall phishing attack and its unusual use of Google Forms. A serious vulnerability threatens K-12 st ... Show More
30m 57s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
Mar 2020
Where Do Viruses Come From?
How do animals get viruses to pass on to humans? That’s what listener Ian wanted to know. To find out, we’re exploring the science of virology - the study of viruses. Virologist Dr. Jasdave Chahal explains how coronavirus jumped through two species into humans, and where they cam ... Show More
16m 8s
Jun 2020
Tracking down hackers-for-hire. SNAKE ransomware bites Honda. Anti-DDoS for criminal markets. And a menu for cyber contraband.
Commercialized hacking-for-hire is traced to an Indian firm, but it’s probably not an isolated problem. Ransomware shuts down Honda production lines in three continents. Criminals develop and distribute an anti-DDoS tool to help keep the dark web souks responsive and available. B ... Show More
21m 51s