Www.spiceworks.com. www.gntsolutions.com R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING EMAIL CAMPAIGNS,

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

POSSIBLE THREATS TO DATA
7 Effective Habits when using the Internet Philip O’Kane 1.
Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.
Trojan Horse Program Presented by : Lori Agrawal.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Data Security.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
 a crime committed on a computer network, esp. the Internet.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Malicious Software.
SunSatFriThursWedTuesMon January One month per page Space to write on your.
2017 monthly calendar template
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
WannaCry/WannaCrypt Ransomware
WannaCry/WannaCrypt Ransomware
Ransomware 12:00 Juwan harris.
Ilija Jovičić Sophos Consultant.
CYBER SECURITY...
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Various Types of Malware
Cyber Security & IT: What’s Next?
Data Compromises: A Tax Practitioners “Nightmare”
Trends in Ransomware Distribution
Encryption Ransomware
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Ransomware: What is it, How to avoid it and How to protect your data
Malware, Phishing and Network Policies
Unit 1.6 Systems security Lesson 2
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
WannaCry Ransomware Overview
Ransomware in Web Apps OWASP Singapore.
CMSC 491/691 Malware Analysis
Unit 1.6 Systems security Lesson 1
2015 January February March April May June July August September
Presentation transcript:

R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS, SOCIAL ENGINEERING, OR WEB BASED DRIVE BY MALWARE INJECTIONS W HEN THE EXPLOIT IS EXECUTED A DOWNLOADER IS PLACED ON THE SYSTEM. T HE DOWNLOADER SILENTLY COMMUNICATES WITH CONTROL SERVERS TO DOWNLOAD AND INSTALL MALWARE / RANSOMWARE AND SECURE AN ENCRYPTION KEY T HE CONTACTED C&C SERVER RESPONDS BY SENDING BACK THE REQUESTED E NCRYPTION K EY AND PROVIDE PAYMENT METHODS RANSOMWARE STARTS TO ENCRYPT THE ENTIRE HARD DISK CONTENT, PERSONAL FILES AND SENSITIVE INFORMATION. A WARNING IS DISPLAYED ON THE SCREEN WITH INSTRUCTIONS ON HOW TO PAY FOR THE DECRYPTION KEY.

1989 : The first ever ransomware virus was AIDS Trojan, also known as the PC Cyborg. 2006: In 2006, the Archiveus Trojan was released. June 2006 : GPcode, encryption Trojan which spread via an attachment mimicking a job application : WinLock displayed pornographic images until the users sent a $10 premium-rate SMS to receive the unlocking code. 2008: Two years after the GP Code virus was created, another variant of the same virus called GPcode.AK was unleashed on the public using a 1024-bit RSA key. Mid-2011: There were about 30,000 new ransomware samples detected in each of the first two quarters of 2011, during the third quarter of 2011, new ransomware detections doubled to 60,000. January 2012: Toolkits for distributing malware and managing botnets evolve, ransomware detections surpassed 100,000 in the first quarter of March 2012: Citadel and Lyposit lead to the Reveton worm. April 2012: Police Ransomware scams that have spread throughout North and South America July 2012: Ransomware detections increase to more than 200,000 samples, or more than 2,000 per day. July -November 2012: Second version of Reveton is released pretending to be from the FBI July 2013: A version of ransomware released targeting OSX users that runs in Safari and demands a $300 fine. August 2014: Reveton adds a new, more powerful password stealer called Pony Stealer. Pony Stealer affects more than 110 applications and turns your computer to a botnet client. September -December 2013: CryptoLocker is released 250,000 machines infected, $27 million in payments received, Locker, a CryptoLocker copycat emerges. Late December 2013: CryptoLocker 2.0 and CryptorBit surface February 2014: CryptoDefense is released. April 2014: CryptoWall is released. More than 600,000 systems were infected between mid-March and August 24, with 5.25 billion files being encrypted. 1,683 victims (0.27%) paid a total $1,101,900 in ransom. May 2014: Zues Botnet Shutdown July 2014: Zues Botnet Network resurfaces August 2014 : SynoLocker appears targeting Synology NAS units Late 2014: TorrentLocker is detected. Early 2015: Crytowall takes off, and replaces Cryptolocker as the leading ransomware infection. Mid TeslaCrypt and VaultCrypt are detected Late Chimera based Ransomware, threatens to sell information on the web. November 2015: CryptoWall version 4.0 comes out and starts infecting workstations through phishing campaigns and exploit kits, reported damages of $325 million

89% of the businesses hit by ransomware were 10 employees or more, while 60% were bigger than 100 employees 43 percent of IT consultants reported a customer falling victim to ransomware in the last year 72 percent of employees were locked out of their files for at least 2 days, and 32% were locked out for at least 5 days Intermedia Report *Intermedia surveyed nearly 300 IT consultants and security experts on the crypto-ransomware threat

Loss of Data and Information Employee Downtime and Loss of Production Ransom Costs IT Consultant Time and Labor Forensic Investigation Cost Data Leak and Compliance Issues HIPPA FINES Impact on Reputation and Loss of Business Relationships IT Infrastructure Upgrades/Overhaul

CRYPTOLOCKER

BitCoin Splash Pages

ANTI RANSOMWARE TOOLS