Cybersecurity

The company man: US glacial response to Nigeria’s detention of former IRS crypto investigator rankles federal agents

Cybersecurity

In a move that could send a chill among business people working overseas, a Nigerian court ruled on Friday that a former American IRS investigator, Tigran Gambaryan, could stand trial on behalf of his employer, the crypto currency exchange Binance, and denied his request for bail. Gambaryan has been held in Nigeria since February. Dina Temple-Raston, host and managing editor of the Recorded Future News podcast “Click Here,” has been following the story for months and explains.

Illustration by Megan J. Goff

Inside the i-Soon papers and China’s secret world of hackers-for-hire

Hacking
Black blue and gray illustration of people coming out of phones

Spyware found on phones in Jordan

Hacking
Inside of a computer

Countries fear state-sponsored cyberwar

Cybersecurity
Illustration by Megan J. Goff

Threat-hunter says Iran is stepping up the sophistication of its cyberattacks

Cybersecurity
Blue, gray and white illustration of flys in cage

China’s dominant role in producing hacking bugs

Global Security

The art of hacking has become stealthier and smarter over the years. Chinese hackers can hide the code they use to infiltrate systems worldwide. These include vulnerabilities that attackers can use to sneak into a computer network. Exploits allow them to start stealing data once they are inside. “Click Here’s” Dina Temple-Raston reports on how they can do this.

illustration

Exclusive: Inside an American hunt forward operation in Ukraine

Ukraine

In an interview with Recorded Future News’ podcast “Click Here,” Hartman says the cooperation between the US and foreign partners like Ukraine has become important in the effort to deter Russia’s cyber operations.

Black, blue and grey illustration of man looking over small figures

The hacker Bassterlord in his own words: Portrait of an access broker as a young man

Hacking

He started off doing simple phishing attacks. But the Russian, who is known as Bassterlord, soon graduated to planting ransomware in emails, holding companies’ data hostage. And he quickly became one of the best. In her exclusive interview with the hacker, Dina Temple-Raston of the “Click Here” podcast delves into the ransomware underworld.

Graphic of Chinese President Xi Jinping.

China’s tech weapons roll in to quell demonstrations, identify protesters

Free speech

The latest demonstrations across China ended when the central government unleashed a digital arsenal that was less deadly than the tanks used to quell the 1989 protests, but just as effective. China managed to use the internet to defuse national outrage over President Xi Jinping’s strict COVID-19 policies without firing a single shot.

In this June 19, 2017, file photo, a person types on a laptop keyboard in North Andover, Massachusetts. 

‘Ransomware Diaries:’ Going undercover with the leader of LockBit

Cybersecurity

Jon DiMaggio, chief security analyst at Analyst1, spent more than a year inside LockBit private channels interacting with LockBitSupp and other members. He recently released a report called “Ransomware Diaries: Volume 1,” that revealed how he infiltrated the group and what he learned while he was on the inside.