الهاكر | الدحيح

New Media Academy Life2 minutes read

Men plan to wreak havoc on El-Bashawra's family, but Saleh suggests using hacker Karim for ransom. The text explores the origins of hacking, ransomware attacks on companies like Quanta and Bakker Logistiek, the impact of WannaCry, and the crucial role of ethical hackers like Marcus Hutchins in combating cyber threats.

Insights

  • Saleh suggests using Karim, a hacker, to hack the Bashawra family's devices for ransom, but later cancels the operation due to Karim's reliance on his laptop, highlighting the potential vulnerability of hackers to disruptions in their tools and environment.
  • The historical anecdotes of Bill Gates and MIT programmers illustrate the origins of hacking, showcasing how early hacking endeavors led to the formation of groups like the "Lakeside Programmers" and the development of hacking stages like Reconnaissance, Scanning, Exploitation, and Backdoor, emphasizing the evolution and complexity of hacking techniques over time.

Get key ideas from YouTube videos. It’s free

Recent questions

  • What is ransomware?

    Malicious software demanding payment for file decryption.

  • Who are white hat hackers?

    Ethical hackers who combat cyber threats.

  • How do companies combat ransomware attacks?

    By investing in Bug Bounty Programs and ethical hackers.

  • What are the risks of virtual communication?

    Compromised personal data and cyber threats.

  • How did Marcus Hutchins combat WannaCry?

    By registering a non-existent website to self-destruct the virus.

Related videos

Summary

00:00

"Hacking for Ransom: A Dangerous Game"

  • The men are planning to wreak havoc on El-Bashawra's family, but Saleh suggests using Karim, a hacker, to hack their devices and demand ransom.
  • Saleh proposes kidnapping a child from the family, but Kemz points out that kids nowadays are more likely to be playing PUBG than near a pond.
  • Saleh questions leaving the operation to Karim, who eats Indomie noodles, while Kemz defends his education as a source of intelligence.
  • Karim successfully hacks the Bashawra family's bank accounts, prompting Saleh to cancel the operation due to Karim's reliance on his laptop.
  • Saleh suggests cutting the internet cable to render Karim useless, comparing him to a chair without nerves or a heart.
  • The text transitions to a historical anecdote about Lakeside School in Seattle introducing students to computers in 1967, highlighting Bill Gates' early hacking endeavors.
  • Bill Gates and his friend Paul Allen pressured the school to purchase a computer, leading to them hacking the system to gain unlimited access for students.
  • The company detected the breach and restricted access, prompting Bill Gates to form the "Lakeside Programmers" group with his peers.
  • The text delves into the origins of hacking, explaining how MIT programmers in the 60s found loopholes in computer systems to perform tasks differently.
  • The process of hacking involves stages like Reconnaissance, Scanning, Exploitation, and Backdoor, with hackers like Kevin Mitnick gaining notoriety for their exploits.

11:49

Ransomware Threat: Hackers Demand Payment for Files

  • Hackers use messengers to deliver ransomware messages to companies, demanding payment for encrypted files.
  • Ransomware viruses, like WannaCry, can hold files hostage until a ransom is paid, affecting individuals and even large companies.
  • Quanta, an Apple manufacturer, was hacked by Russian hackers who demanded a $50 million ransom for decrypting codes.
  • Bakker Logistiek's ransomware attack in the Netherlands led to supermarket shelves devoid of cheese due to encrypted records.
  • WannaCry, created from leaked NSA loopholes, spread to 200,000 devices in 150 countries, affecting companies like Nissan and hospitals like the UK's NHS.
  • Hospitals are vulnerable targets for ransomware attacks due to critical data encryption, potentially leading to patient harm or death.
  • White hat hackers, like Marcus Hutchins, play a crucial role in combating ransomware attacks by discovering and exploiting virus vulnerabilities.
  • Marcus Hutchins saved millions of devices from WannaCry by registering a non-existent website the virus was programmed to reach, causing it to self-destruct.
  • Companies invest in ethical hackers through Bug Bounty Programs to identify and fix system vulnerabilities, preventing costly data breaches.
  • The digitization of the world has made technology a powerful tool, connecting billions globally and storing vast amounts of information in small digital formats.

23:08

Cyberattack on Colonial Pipeline prompts presidential intervention

  • Colonial, a US company with a major oil pipeline system producing 2.5 million barrels daily, was attacked by ransomware demanding $5 million, causing a halt in operations and threatening a return to the middle ages until President Biden intervened to assure system restoration.
  • The ease of virtual communication poses risks as a simple hack can compromise personal data, emphasizing the importance of securing oneself online by saving passwords, backing up files, updating security systems, avoiding suspicious links, and being cautious of clickbait content.
Channel avatarChannel avatarChannel avatarChannel avatarChannel avatar

Try it yourself — It’s free.