Infiltrating ransomware gangs on the dark web

36,864
0
Published 2024-04-14
Jon DiMaggio, a former intelligence community analyst and current cybersecurity strategist, has used fake personas to communicate with ransomware gangs on the dark web, finding out who's behind them and how they work.

"60 Minutes" is the most successful television broadcast in history. Offering hard-hitting investigative reports, interviews, feature segments and profiles of people in the news, the broadcast began in 1968 and is still a hit, over 50 seasons later, regularly making Nielsen's Top 10.

Subscribe to the "60 Minutes" YouTube channel: youtube.com/60minutes
Watch full episodes: cbsn.ws/1Qkjo1F
Get more "60 Minutes" from "60 Minutes: Overtime": cbsnews.com/60-minutes/overtime/
Follow "60 Minutes" on Instagram: instagram.com/60minutes/
Like "60 Minutes" on Facebook:facebook.com/60minutes
Follow "60 Minutes" on Twitter: twitter.com/60Minutes
Subscribe to our newsletter: cbsnews.com/newsletters/
Download the CBS News app: cbsnews.com/mobile/
Try Paramount+ free: paramountplus.com/?ftag=PPM-05-10aeh8h

For video licensing inquiries, contact: [email protected]

All Comments (21)
  • @scootter37
    Working for a company that provides cyber security, I can tell you no company is too small or too large from cyber attacks and you're at risk if you haven't implemented a cyber security solution. It takes years to build your business and seconds to lose it. Standard "off the shelf anti virus" does little to protect from attacks.
  • I really hope this gets addressed because America values it's privacy
  • @b3twiise853
    Inflation so hard 60 min videos become 6 minutes
  • FYI Ive had hacker groups remove my data from their leak. They may be attacking business and at the same time leaked my info but also have done more to protect my info then the company I felt were safe and would protect my info...
  • I've also come across sketchy operatives, veterans with a history of violence (also targeting me & others). They had access in 2013/14 to alter social media posts of the WA state Sheriff's onboard vehicle computer's database. Meaning, someone had access to alter the local law enforcement's database - making it look like I posted something I didn't. I showed my phone text/post to the local Sheriff - it was terrifying that a criminal had access to do that. Surprisingly to me, the Sheriff wasn't surprised, wasn't shocked. It's far worse than you think and much of it is domestic w/some foreign connections.
  • @charlessmith263
    I got slammed by a ransomware attack 2 times on my desktop computer recently by Scattered Spider! But I knew what to do when I got ransomwared 2 times - shut down the computer before the ransomware-malware finished its payload and permanently ENCRYPT my files!!! I knew what to do!!!! My computer was intact! And I never paid bitcoin ransom to Scattered Spider!!! Kept my money!!!
  • @richjoyal
    I was hit once by ransomware, luckily i had backup.
  • @DIGITAL27
    They watching this and strong they game up , thanks for sharing how yall attacking them
  • @D.von.N
    Don't pay the criminals then! Backup and secure your data, educate your staff every now and then, and never pay the ransom. Even if you do, you never have a guarantee you get your system back, and/or the data weren't leaked to the hackers already.
  • @4115steve
    we should cut off all fiber optic cable that goes to russia
  • @SandyRiverBlue
    There are a very discreet number of folks who have the skills to pull off these kind of attacks. In the 1980s we had ways of dealing with bad actors that had it in them to harm large groups of people. I wouldn't be against bringing some of that Cold warfare back. If it was discovered that hacking infrastructure was bad for your health, I imagine that a lot of this stuff would stop. Probably not going to happen though. ( ;
  • @gw2315
    Here’s a the solution corporate America stop outsourcing tech positions over shores!
  • @RobertArlensky
    Companies should stick to Ad Hoc systems. Get rid of wireless and go back to wires.
  • @sutats
    Let's advance to WarGames 1983.
  • @Theabstractblu
    Imagine online gf being a fed 😂 probably happens alot