{"id":143283,"date":"2022-04-26T04:01:00","date_gmt":"2022-04-26T08:01:00","guid":{"rendered":"https:\/\/www.cyberark.com\/blog\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/"},"modified":"2026-04-03T16:52:32","modified_gmt":"2026-04-03T20:52:32","slug":"ep-1-talking-ransomware-w-andy-thompson","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/","title":{"rendered":"EP 1 &#8211; Talking Ransomware w\/ Andy Thompson"},"content":{"rendered":"<p>Today, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get into the cyber extortion action. No special training or skills required. So, what can we do? In the premiere episode of the Trust Issues\u2122 podcast, David Puner talks about this and more with Andy Thompson, advisor &amp; evangelist at CyberArk Labs.<\/p>\n<div class=\"transcript\" style=\"white-space:pre-line\">[00:00:00.000] &#8211; David Puner<br \/>\nYou&#8217;re listening to the Trust Issues Podcast. My name is David Puner.<\/p>\n<p>[00:00:17.360] &#8211; David Puner<br \/>\nThe democratization of&#8230; Just fill in the blank. The phrase has become a tired, de facto conference track title. Just do a search. It&#8217;s everywhere. The democratization of finance, information, cout ure, creativity; they&#8217;ve all been democratized and delivered to the masses. Yet, the phrase may legitimately be the best way to describe the sweeping global ransomware phenomenon that&#8217;s plaguing organizations everywhere.<\/p>\n<p>[00:00:44.360] &#8211; David Puner<br \/>\nOnce a tactic reserved for highly skilled criminals, extortion involved heart-poundingly bank heists, airplane hijackings, and abducted French kings commanding three million gold crowns. But now, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get in on the cyber extortion action. No special training or skills required. How have we gotten here? Where&#8217;s it all headed? What can we do? It&#8217;s the focus of today&#8217;s episode of Trust Issues.<\/p>\n<p>[00:01:19.230] &#8211; David Puner<br \/>\nIn today&#8217;s episode, I talk to Andy Thompson, Advisor, Evangelist for CyberArk Labs, and a guy you really would want to have at your dinner table, or maybe go on a road trip with. He knows so much about cybersecurity and every aspect of it, and can go deep and just make anything interesting, which is why we start with a subject that is inherently interesting, and that is ransomware. I think you&#8217;re going to enjoy it, so why don&#8217;t we just get to it? I&#8217;ll stop the babbling, and let&#8217;s hear from Andy Thompson.<\/p>\n<p>[00:02:02.370] &#8211; David Puner<br \/>\nWe&#8217;re going to talk about arguably the biggest and most pervasive cyber threat out there: ransomware. First of all, I guess, do you agree with that statement?<\/p>\n<p>[00:02:12.670] &#8211; Andy Thompson<br \/>\nAbsolutely. Ransomware has just blossomed, not just from its inception, but really within the last two years. We&#8217;ve seen a triple digit increase in the proliferation of ransomware, and a lot of it has to do with the fact that the business model has changed. No longer do you have to be evil enough to create the content and the ransomware, but you just have to be malicious enough to propagate it. And that&#8217;s really where the ransomware as a service has really springboarded ransomware as far as a threat in personal and corporate environments.<\/p>\n<p>[00:02:49.070] &#8211; David Puner<br \/>\nHow have we gotten to the point where ransomware came into being, and now we&#8217;re at this point where we&#8217;re talking about triple extortion and ransomware as a service? Really, things have gotten crazy over the years, but they probably started out seeming crazy, and now they&#8217;re super crazy.<\/p>\n<p>[00:03:05.550] &#8211; Andy Thompson<br \/>\nI want to set the stage: 1989, Global AIDS Conference. Gentleman by the name of Dr. Joseph Popp was distributing I think 20,000 different floppy disks with a software, and actually had a note on there from PC Cyborg company stating that after several days\u201490 days, to be specific\u2014the computer would be basically inoperable, and they&#8217;d have to send a check for $189 to a PO box in Panama. Now, Scotland Yard didn&#8217;t take too kindly to that, and ultimately arrested him and charged him for extortion. That was the inception of ransomware.<\/p>\n<p>[00:03:40.790] &#8211; Andy Thompson<br \/>\nSince then, it has changed really due to the internet in the ability to proliferate ransomware. And along with that came the creation of cryptocurrency and pseudo-anonymous transactions. That really was what caused ransomware to basically explode. It&#8217;s money laundering at the nth degree. And so I think that&#8217;s really kind of what caused ransomware ever since the internet in 2009, 2011, when cryptocurrency came into play.<\/p>\n<p>[00:04:14.760] &#8211; David Puner<br \/>\nSo how did cryptocurrency allow it to blossom, or explode, as the case may be?<\/p>\n<p>[00:04:20.320] &#8211; Andy Thompson<br \/>\nWell, originally, we were talking about writing a check. And then came gift cards and money orders and Green Dot. And all of that had a paper trail essentially leading right back to the ransomware operators. With Bitcoin, in particular, that technology allowed for, again, that pseudo-anonymous financial transaction. What we&#8217;ve seen even recently, more so, is moving to a whole different cryptocurrency called Monero, where an obfuscated ledger basically allows for completely anonymous transactions of finances, and essentially money laundering.<\/p>\n<p>[00:05:01.150] &#8211; David Puner<br \/>\nDoes that make it just a losing game if you&#8217;re a defender?<\/p>\n<p>[00:05:06.430] &#8211; Andy Thompson<br \/>\nThese ransomware outfits have like global help desks. They have training materials, they&#8217;ve got professional-level backends supporting these malicious outfits. So I think what we&#8217;re finding is it&#8217;s less Wild Wild West and craziness, but more a migration to professionalism and processes based out of these outfits. Does that make sense?<\/p>\n<p>[00:05:31.750] &#8211; David Puner<br \/>\nYeah, it&#8217;s kind of like when the Sundance Film Festival becomes legitimate or something like that.<\/p>\n<p>[00:05:37.470] &#8211; Andy Thompson<br \/>\nYeah, yeah.<\/p>\n<p>[00:05:38.870] &#8211; David Puner<br \/>\nI&#8217;m talking to you about this today, Andy. And you&#8217;re an expert in many things, but you&#8217;ve definitely been deep involved and interested in ransomware for a while now. Can you give us a little bit of a rundown of how you got involved and how it is involved in your day to day now?<\/p>\n<p>[00:05:56.190] &#8211; Andy Thompson<br \/>\nYeah, absolutely. I really started researching ransomware back in 2016. I&#8217;m an active member and one of the organizers for the Dallas Hackers Association back here in Dallas. Somebody reached out to the Dallas Hackers Association stating a problem. It was kind of a sad story, really. A widower recently lost his wife, and all their photos from years and years and years were stored on this machine that was compromised by ransomware.<\/p>\n<p>[00:06:27.070] &#8211; Andy Thompson<br \/>\nHe didn&#8217;t know what to do, so reached out to us, and we did our best to help this gentleman. We were able to actually recover the encryption cre and restore all his files. But that really got me thinking, how far is this being taken? And so I started researching history of ransomware, analysis of how it works, and really, most importantly, the mitigation controls around ransomware. Since then, I&#8217;ve become part of the Ransomware Task Force.<\/p>\n<p>[00:06:55.770] &#8211; David Puner<br \/>\nLet&#8217;s take two steps back. I want to ask you about the Ransomware Task Force in a second, but first, to go back to the Dallas hacking scene for a second. The gentleman who reached out to you regarding the images that he was trying to get back, how did he get connected with the Dallas hacking scene? What does a Dallas hacking scene look like? Is it kind of, you know, to those who don&#8217;t know anything about it&#8230; Or maybe it&#8217;s just me, when I think of something like that, it&#8217;s like, &#8220;You can&#8217;t find us, we&#8217;ll find you,&#8221; or something, or whatever the A-Team&#8217;s saying is.<\/p>\n<p>[00:07:25.490] &#8211; Andy Thompson<br \/>\nNo. It&#8217;s quite the opposite. We&#8217;re totally out there in the public. We have a Meetup, a website, it&#8217;s on meetup.com. This organization meets once a month at a Korean karaoke bar of all places. And we basically have a miniature conference once a month with lock picking, we have a capture the flag competition, we have 15-minute fire infosec talks. It&#8217;s really cool. It&#8217;s like a miniature Defcon.<\/p>\n<p>[00:07:53.450] &#8211; David Puner<br \/>\nAbout how many of those communities would you say are around the country?<\/p>\n<p>[00:07:56.950] &#8211; Andy Thompson<br \/>\nHonestly, all of them, really. If you look hard enough, you can find ISSA chapters, (ISC)\u00b2 chapters. The meetings are on their websites. But Defcon groups, there&#8217;s chapters all over the United States. Hacking is NOT a Crime, another organization with multiple chapters all over the world. There&#8217;s the BSides conferences that, again, are all over from Dallas to Tel Aviv to Sydney, Australia to Las Vegas. All of these are just near and dear to my heart.<\/p>\n<p>[00:08:27.940] &#8211; David Puner<br \/>\nSo back to the Ransomware Task Force for a second. That is something internal at CyberArk, or is that elsewhere?<\/p>\n<p>[00:08:35.100] &#8211; Andy Thompson<br \/>\nIt&#8217;s actually external. It&#8217;s a collective of about 60 different organizations that have partnered together, just experts in the industry, to provide guidance to governments and corporate organizations, providing recommendations regarding security control, cybersecurity insurance, mitigation methods, you name it. And so I&#8217;m just a small part of that organization.<\/p>\n<p>[00:09:00.740] &#8211; David Puner<br \/>\nWe talked about the beginning of ransomware, and then how it just was really able to explode with the internet. In 2017, we had the WannaCry outbreak; 2017, NotPetya; 2020, SolarWinds; 2021, Kaseya. And those are just a few of the notable names. How have the defenders evolved along with the the offenders, as it were?<\/p>\n<p>[00:09:23.300] &#8211; Andy Thompson<br \/>\nThat&#8217;s a great question. Let&#8217;s start with where we&#8217;re seeing more adoption in, and it is the fact that these criminal organizations are consolidating. There&#8217;s several major outfits like REvil, Conti. Lapsus$ is big in the news today. These organizations are consolidating and really focusing their attacks on big organizations. It&#8217;s no longer the kind of spray-and-pray spam emails that you see in the past. They&#8217;re spearfishing, they&#8217;re targeting individuals within organizations for what I call, or what we call, business email compromise. You&#8217;re more apt to accept an email and an attachment from a legitimate email within your organization.<\/p>\n<p>[00:10:13.110] &#8211; Andy Thompson<br \/>\nSo we&#8217;re seeing the ability of these attackers focusing on application vulnerabilities from externally facing web apps. We&#8217;re seeing RDP brute-forcing of externally facing terminal services sessions. These sorts of attacks are really what we&#8217;re seeing as the majority of the vectors in for corporate ransomware. The other thing is that they&#8217;re no longer just satisfied with compromising a single machine. Once the foothold is established, there&#8217;s, goodness, upwards of 100 days of dwell time within these organizations before they pull the trigger and execute the end game, and that&#8217;s really the ransomware.<\/p>\n<p>[00:10:57.640] &#8211; Andy Thompson<br \/>\nAnd I think what&#8217;s really important to note is the change in the definition of what ransomware is. Previously it was just encrypting files and holding that for ransom. And we&#8217;ve seen organizations like Lapsus$ that completely bypass the file encryption and move straight to double extortion, where they&#8217;re holding the files for ransom. They&#8217;re exfiltrating the data, the proprietary sensitive information, and again, holding that for ransom. So let&#8217;s just call a spade a spade, folks. Ransomware is extortion. That&#8217;s the simple answer. We&#8217;ve really moved from file encryption. And again, that&#8217;s still present in the industry, but we&#8217;re just talking about straight-up extortion.<\/p>\n<p>[00:11:44.730] &#8211; Andy Thompson<br \/>\nI&#8217;ve also seen IoT devices being compromised. We saw recently at Defcon&#8230; Well, not recently, a couple of years back. But a IoT heating and air conditioning thermostat was compromised. They could literally sweat you out of house and home until you pay the ransom. I also recently saw some evidence of mobile software on televisions being compromised by ransomware.<\/p>\n<p>[00:12:10.810] &#8211; Andy Thompson<br \/>\nSo I think a lot of that has to do with the&#8230; Ransomware authors are starting to use cross-platform scripting languages in order to do this sort of malicious activity. So we&#8217;re seeing a lot of evolution in the advancement of ransomware\u2014from a software perspective, from a target perspective, you name it.<\/p>\n<p>[00:12:30.560] &#8211; David Puner<br \/>\nWe are in the business of defending and protecting here. This is a pretty big battle. Can it be won? And obviously, organizations are comprised of individuals. What can we do from an individual standpoint? And what can organizations do to fight back?<\/p>\n<p>[00:12:46.520] &#8211; Andy Thompson<br \/>\nI think the reason why ransomware works initially is because organizations fail to practice good security hygiene, and they&#8217;re using somewhat ineffective methods to mitigate ransomware. And so from a personal perspective, I think it&#8217;s about being vigilant, being aware of what ransomware is, how it propagates, what to be aware of. So in the event that your grandmother, for example, gets a ransomware spam message, that she&#8217;s aware of not clicking these sorts of things.<\/p>\n<p>[00:13:18.130] &#8211; Andy Thompson<br \/>\nAnother thing that I recently released on my GitHub is a really, really simple script that just reassigns the default application from PowerShell to Notepad. So again, there&#8217;s probably no reason why my grandmother should be executing batch scripts and things like that. So check out my GitHub. It&#8217;s github\/binarywasp. It&#8217;s a terrible, terrible name I picked back in high school, but I still keep it around.<\/p>\n<p>[00:13:45.090] &#8211; Andy Thompson<br \/>\nSimple security controls go a long way in preventing ransomware from a personal perspective. But from a larger enterprise organization perspective, there&#8217;s two acronyms that I really promote, and it&#8217;s least privilege and application control, so LP and AC. Those two things, as a combination, go a incredibly long way in preventing today&#8217;s version of ransomware.<\/p>\n<p>[00:14:09.890] &#8211; Andy Thompson<br \/>\nWhat I&#8217;ve seen, again, when I mentioned ineffective methods, is signature-based AV, for example. Ransomware, and today&#8217;s malware, is what we call polymorphic. It changes. Simply flipping a byte changes the hash and the fingerprint of these ransomware strains. And so signature-based stuff doesn&#8217;t really work. And then you see some EDR endpoint data, protection agents and things like that, can detect the behavior, but only after the fact.<\/p>\n<p>[00:14:38.820] &#8211; Andy Thompson<br \/>\nSo I personally believe that the concept of least privilege, removing local admin rights, can prevent the installation of really aggressive malware. So attackers can&#8217;t do reconnaissance and propagate and laterally move within a network. But more importantly is application control. This is a hard thing to do in a lot of organizations, when you explicitly allow or explicitly deny applications. So what I advocate for&#8230; Like server environments, for example, you know exactly what software is supposed to be running on that system. Really, allow listing is the recommendation there.<\/p>\n<p>[00:15:20.100] &#8211; Andy Thompson<br \/>\nWhen it comes to endpoints, it&#8217;s a little harder. I just had to upgrade my Chrome or browser just to get into this webcast today. New software is coming out. It&#8217;s a challenge for an IT organization to allow list everything. So I call this kind of a gray listing approach to application control\u2014 hamstringing and limiting the capacity of binaries in your environment. So for example, if we restrict a piece of malware, a unknown binary in our organization from internet access, for example, it can&#8217;t facilitate that encryption key exchange that many ransomware variants use.<\/p>\n<p>[00:16:02.680] &#8211; Andy Thompson<br \/>\nAnother thing is preventing the ability for unknown binaries and applications from reaching out to shared network volumes and map drives. That, again, prevents the ability for ransomware to propagate beyond the initial infection. So again, the combination of least privilege and application control go an incredibly long way.<\/p>\n<p>[00:16:25.400] &#8211; Andy Thompson<br \/>\nI also think end user awareness training\u2014I mentioned that earlier from my grandmother&#8217;s perspective\u2014I think it goes a long way in corporate environments as well. Another thing that I think a lot of corporate environments need to be aware of, or start doing, if they&#8217;re not already, is operate under that assumed breach mindset. This is really scary, folks. Lapsus$, the organization that&#8217;s in the news currently, they are soliciting malicious insiders to establish that foothold, so you don&#8217;t have to worry about vulnerabilities. They&#8217;re opening the door wide open for these folks.<\/p>\n<p>[00:17:04.240] &#8211; Andy Thompson<br \/>\nIf you have and operate under a assume breach mindset, you&#8217;re watching internally just as aggressively as you are externally for these sorts of malicious threats. So I think a combination of user awareness, technical controls like least privilege, application control, and operating under that assume breach mindset will go a long way in protecting corporate organizations.<\/p>\n<p>[00:17:26.820] &#8211; David Puner<br \/>\nSo you mentioned a couple things there that I think are pretty interesting. The idea of malicious insiders, what can we possibly do about that?<\/p>\n<p>[00:17:34.660] &#8211; Andy Thompson<br \/>\nWatch the watchers. Oftentimes, we&#8217;re seeing this from the perspective of an IT organization, a rogue systems administrator, but we need to be aware that that&#8217;s no longer the case. I mean, somebody in Accounting or Finance, Procurement, HR, Legal, these people have sensitive information that can be leaked. So again, be aware that it&#8217;s no longer just an IT problem. Watch your privileged users for malicious activities.<\/p>\n<p>[00:18:08.290] &#8211; Andy Thompson<br \/>\nMake sure that you&#8217;re locking down the end user workstation so that in the event that a machine is compromised, that it can&#8217;t facilitate reconnaissance, it can&#8217;t facilitate lateral movement or privileged escalation. We ultimately want to stop the initial foothold. But in the event that the foothold is already established, we want to make it as difficult as possible to establish that foothold and really propagate that ransomware.<\/p>\n<p>[00:18:34.360] &#8211; David Puner<br \/>\nSo the last couple of years, we&#8217;ve been talking a lot about work from anywhere and how it&#8217;s ramped up the opportunities for these malicious actors. How have we come to adapt better to that?<\/p>\n<p>[00:18:45.200] &#8211; Andy Thompson<br \/>\nWell, COVID really kind of kickstarted and ramped digital transformation into the next level. What we&#8217;ve seen is a mass migration to working remotely, working from home. What I see there is a real risk. We see people working their day jobs from the same machine that their kids are playing Minecraft on. That&#8217;s particularly scary, because oftentimes, we see that corporate security controls don&#8217;t propagate down to the machines and mobile devices that people are using to do their job, which is really scary.<\/p>\n<p>[00:19:26.680] &#8211; Andy Thompson<br \/>\nBut we&#8217;ve also seen migration to remote access, to secure environments. There are secure ways to tunnel traffic and tunnel your day-to-day job in a remote and secure way. I feel that, in my personal opinion, of course, that the digital transformation that has happened so recently due to COVID is more so exposing us to risk than it is helping us, from a ransomware perspective.<\/p>\n<p>[00:19:58.540] &#8211; David Puner<br \/>\nWhat can happen if an organization does receive that initial infection? Is that just game over, or is there something positive that they can do to get out of that situation?<\/p>\n<p>[00:20:09.620] &#8211; Andy Thompson<br \/>\nNot necessarily game over. I mean, yeah, it&#8217;s bad. You need to assess the damage, find out what potentially has been encrypted, what ultimately sensitive information or systems have been exposed to this level of an attack. If it&#8217;s not in the logs, it didn&#8217;t happen. Or you don&#8217;t know what you don&#8217;t know. So go back to the logs and really find some level of attribution.<\/p>\n<p>[00:20:37.130] &#8211; Andy Thompson<br \/>\nBut again, it&#8217;s not necessarily game over, because if you&#8217;re doing things right, you&#8217;ve got some level of air-gapped backups to restore from. Ideally, that&#8217;s what I would advocate for is never to pay a ransom, but to do your best to facilitate a backup and recovery program. That&#8217;s easier said than done. So what I really advocate for is a lot of organizations to do a regular mock ransomware event.<\/p>\n<p>[00:21:07.590] &#8211; Andy Thompson<br \/>\nThere&#8217;s also cyber security insurance, which I&#8217;m still on the fence about, but it goes a long way in recovery financially, as well as instantiating some of the basic controls within the organization as well. In order to even receive cyber insurance, the minimum security controls have to be in place. And so that goes a long way in preventing ransomware. But ideally, the controls that we&#8217;re recommending here proactively prevent and also help constrain the damage as well. I hope that kind of answers your question.<\/p>\n<p>[00:21:44.930] &#8211; David Puner<br \/>\nYeah, it answers my question in a big way, I think. Thank you for that. We&#8217;ve talked about how it started, how it&#8217;s evolved, where we&#8217;ve been with it in the last few years. Where is this all going? I mean, not that you&#8217;ve got a magic ball, but where is it going, and as defenders, how do we best keep on top of that so we can do our jobs successfully?<\/p>\n<p>[00:22:10.690] &#8211; Andy Thompson<br \/>\nOh, wow. Great question. Where is ransomware moving to? I got my answer right now. It&#8217;s industrial control systems. I think that&#8217;s going to be the next wave of ransomware. Ransomware no longer has to just encrypt files. We&#8217;re seeing, again, that double extortion, holding the information for ransom, but also we&#8217;re seeing triple extortion.<\/p>\n<p>[00:22:32.330] &#8211; David Puner<br \/>\nYes, I was hoping you would mention that.<\/p>\n<p>[00:22:34.850] &#8211; Andy Thompson<br \/>\n[crosstalk 00:22:34] DDoS you. So I think those are some of the advancements that we&#8217;re going to see in the ransomware landscape.<\/p>\n<p>[00:22:41.250] &#8211; David Puner<br \/>\nTriple extortion doesn&#8217;t sound good at all. Maybe I heard this wrong, I&#8217;m not sure, but that more and more, ransomware is going to be industry-specific?<\/p>\n<p>[00:22:49.050] &#8211; Andy Thompson<br \/>\nYeah, you&#8217;re absolutely right. I mean, it depends on who&#8217;s actually the malicious actor behind the the keyboard. But we&#8217;re seeing industries like healthcare being particularly targeted by certain ransomware operators because of the fact that this is extremely sensitive information that we&#8217;re dealing with, and it&#8217;s very time-sensitive. There are documented cases that systems being offline have cost people their lives. It really has real ramifications.<\/p>\n<p>[00:23:21.420] &#8211; Andy Thompson<br \/>\nThere was a famous bank robber, and they were asked, &#8220;Why are you robbing banks?&#8221; And the answer is, &#8220;Because that&#8217;s where the money is.&#8221; And I think that&#8217;s what we&#8217;re going to see a lot of in the future. And currently, really, bad actors, these ransomware operators are no longer targeting the piddly onesies and twosies and $100 ransoms. They&#8217;re going after $5 million, $11 million ransoms. And so I think what we&#8217;re going to see is bigger ransoms and and bigger consequences.<\/p>\n<p>[00:23:53.240] &#8211; David Puner<br \/>\nAndy, I look forward to doing part two of this podcast sometime in the near future, because you&#8217;re just a fantastic wealth of information. If you want to leave the listeners here with one thing, what&#8217;s another thing that they that they should know going out of this conversation about ransomware?<\/p>\n<p>[00:24:10.520] &#8211; Andy Thompson<br \/>\nRansomware is real. It&#8217;s evolved over time. It&#8217;ll continue to evolve. But at the same time, I think the recommendation is solid, it&#8217;s foundational, and it&#8217;s not going to change, whether it&#8217;s file encryption, whether it&#8217;s data exfiltration, whether the instantiation of malware and propagating through the network.<\/p>\n<p>[00:24:36.880] &#8211; Andy Thompson<br \/>\nAgain, I&#8217;ve been dogging on my grandmother real hard on this call today, but she told me something a while back that I thought was really poignant, and it&#8217;s something that I want to leave you with. &#8220;An ounce of prevention is worth a pound of cure.&#8221; And by proactively putting in controls in place, specifically least privilege and application control, end user awareness, these sorts of things really go a long way in protecting your organization.<\/p>\n<p>[00:25:04.070] &#8211; David Puner<br \/>\nAnd if there&#8217;s another thing that I&#8217;ve taken from this conversation, it is do not mess with Andy&#8217;s grandma.<\/p>\n<p>[00:25:10.910] &#8211; Andy Thompson<br \/>\nExactly.<\/p>\n<p>[00:25:12.110] &#8211; David Puner<br \/>\nAndy, this has been awesome. Thanks so much.<\/p>\n<p>[00:25:14.950] &#8211; Andy Thompson<br \/>\nThank you for having me.<\/p>\n<p>[00:25:16.150] &#8211; David Puner<br \/>\nTalk to you soon.<\/p>\n<p>[00:25:27.210] &#8211; David Puner<br \/>\nThanks for listening to today&#8217;s episode of Trust Issues. We&#8217;d love to hear from you. If you have a question, comment\u2014constructive comment, preferably, but it&#8217;s up to you\u2014or an episode suggestion, please drop us an email at trustissues@cyberark.com. And make sure you&#8217;re following us wherever you listen to podcasts.<\/p><\/div>\n","protected":false},"featured_media":214233,"template":"","class_list":["post-143283","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 1 - Talking Ransomware w\/ Andy Thompson | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 1 - Talking Ransomware w\/ Andy Thompson\" \/>\n<meta property=\"og:description\" content=\"Today, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get into the cyber extortion action. No special training or skills required. So, what can we do? In the premiere episode of the Trust Issues\u2122 podcast, David Puner talks about t...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T20:52:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"20\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/\",\"url\":\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/\",\"name\":\"EP 1 - Talking Ransomware w\/ Andy Thompson | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg\",\"datePublished\":\"2022-04-26T08:01:00+00:00\",\"dateModified\":\"2026-04-03T20:52:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 1 &#8211; Talking Ransomware w\/ Andy Thompson\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 1 - Talking Ransomware w\/ Andy Thompson | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/","og_locale":"ja_JP","og_type":"article","og_title":"EP 1 - Talking Ransomware w\/ Andy Thompson","og_description":"Today, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get into the cyber extortion action. No special training or skills required. So, what can we do? In the premiere episode of the Trust Issues\u2122 podcast, David Puner talks about t...","og_url":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-03T20:52:32+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"20\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/","url":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/","name":"EP 1 - Talking Ransomware w\/ Andy Thompson | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg","datePublished":"2022-04-26T08:01:00+00:00","dateModified":"2026-04-03T20:52:32+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cnR3b3JrLmpwZw-2.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-1-talking-ransomware-w-andy-thompson\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"EP 1 &#8211; Talking Ransomware w\/ Andy Thompson"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/podcast\/143283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/media\/214233"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/media?parent=143283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}