

- JACK CABLE STAMOS RANSOMWHERE 32M PAGETECHCRUNCH SOFTWARE
- JACK CABLE STAMOS RANSOMWHERE 32M PAGETECHCRUNCH CODE
Jack was named one of Time Magazine’s 25 most influential teens for 2018. After placing first in the Hack the Air Force challenge, Jack began working at the Pentagon’s Defense Digital Service. Anyone can enter a payment demand they have received, though people are required to submit a screenshot of the ransom note as one means of. Jack is a top-ranked bug bounty hacker, having identified over 350 vulnerabilities in companies including Google, Facebook, Uber, Yahoo, and the US Department of Defense. How it works: Ransomwhere is an 'open, crowdsourced ransomware payment tracker' launched by Jack Cable, a former government cybersecurity expert who now works as a security architect for Krebs Stamos Group. Jack formerly served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. Jack Cable is a security researcher and student at Stanford University, currently working as a security architect at Krebs Stamos Group. Tod highlights some of the many things Discourse is doing right with its security program.
JACK CABLE STAMOS RANSOMWHERE 32M PAGETECHCRUNCH CODE
Stick around for our Rapid Rundown, where Tod and Jen talk about a remote code execution vulnerability that open-source forum provider Discourse experienced recently, which CISA released a notification about over the weekend. They chat about how Cable came up with the idea, the role of cryptocurrency in tracking these payments, and how better data sharing can help combat the surge in ransomware attacks. “To whatever extent we can take advantage of this to reduce the damage can go a long way,” Cable said.In this episode of Security Nation, Jen and Tod chat with Jack Cable, security architect at the Krebs Stamos Group, about Ransomwhere, a crowdsourced ransomware payment tracker. Ransomware gangs can be “sloppy” in their tradecraft, he added.
JACK CABLE STAMOS RANSOMWHERE 32M PAGETECHCRUNCH SOFTWARE
The 21-year-old, who made his name by hacking Pentagon software systems as a teenager to make them more secure, said he would continue to look for weaknesses in attacker infrastructure when he had time. “It shows that even though we may think of all attackers as being very sophisticated, the reality is that since this is financially motivated, there’s going to be a range of sophistication levels,” Cable told CyberScoop.Ĭybercriminals “looking to make a quick buck” are “unlikely to have a robust security team,” Cable pointed out. The ransomware authors have since fixed the glitch, but Cable’s efforts count as a small yet significant win against a broader scourge of ransomware incidents that has affected countless U.S. That prevented some $27,000 in potential victim losses. The firm confirmed the ransomware attacks on Thursday, saying it was “urgently working on a solution to remove malware from infected devices.”Ĭable took to Twitter late Wednesday asking victims of the ransomware to get in touch so he could help recover their data. He said 50 people from various parts of the world messaged him, and that he was able to get their data back using the same glitch in the hackers’ payment scheme. The new strain of ransomware, known as QLocker, has flooded the internet in recent days, targeting network storage systems made by Taiwan-based QNAP Systems. Cable, who served as a cybersecurity adviser to the Department of Homeland Security during the 2020 election, realized that if he changed one letter from lowercase to uppercase in the “transaction ID” the hackers were using to track payments, the system mistook the input for a victim that had already paid and unlocked the files. The hackers were demanding 0.01 Bitcoin, or roughly $550 at the time, to unlock the doctor’s files. The doctor was preparing to pay the ransom when Cable began looking at the hackers’ payment system, according to Cable.

Stanford University student and security researcher Jack Cable got a call Wednesday from a family friend, who is a doctor, asking for help because cybercriminals had locked the doctor’s computer. The hackers behind a nascent strain of ransomware hit a snag this week when a security researcher found a flaw in the payment system and, he says, helped victims save $27,000 in potential losses.
