Trends in Ransomware Distribution

Slides:



Advertisements
Similar presentations
The Threat Landscape Jan Threat Report 2.
Advertisements

UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
APT29 HAMMERTOSS Jayakrishnan M.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
CompTIA Security+ Question Answer SY Detaille of CompTIA SY0-401 Pass4sure.. VENDOR COMPTIA EXAM NAME COMPTIA SECURITY+ EXAM CODE SY0-401 TOTAL.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
WannaCry/WannaCrypt Ransomware
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Ransomware Guidance For Health Centers
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Your Partner for Superior Cybersecurity
BUILD SECURE PRODUCTS AND SERVICES
Leverage the Cloud to Minimize the Impact of Ransomware
CISOs Guide To Communicating WNCRY.
WannaCry/WannaCrypt Ransomware
A Virtual Tour of SophosLabs Building next-generation protection
3 Do you monitor for unauthorized intrusion activity?
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
Your security risk is higher than ever.
Threat Scan (ETS) for Office 365
Prevention against Ransomware costs - Arcserve UDP
Threat Scan (ETS) for Office 365
There Will be Attacks – Improve Your Defenses
[Internal Use] for Check Point employees​
Building A Security Program From The Ground Up
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Unit 4 IT Security.
Ransomware & Security for Virtualization
Active Cyber Security, OnDemand
Lesson Objectives Aims You should be able to:
Cyber Security & IT: What’s Next?
Sophos Intercept Next-Gen Endpoint Protection
Data Compromises: A Tax Practitioners “Nightmare”
Report Phishing Forward phishing s to
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Norton Antivirus Technical Support Number Norton toll free number
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Encryption Ransomware
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
4 ways to stay safe online 1. Avoid viruses and phishing scams
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
So… what is ransomware? #SPICECORPS.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Strong Security for Your Weak Link:
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
There Will be Attacks – Improve Your Defenses
Report Phishing Forward phishing s to
Secure once, run anywhere Simplify your security with Sophos
WannaCry Ransomware Overview
The information in this presentation is marked as:
Healthcare Cloud Security Stack for Microsoft Azure
Anatomy of a Large Scale Attack
CSCD 434 Spring 2019 Lecture 10 Attacks for Profit Ransomeware 1.
Information Protection
3 Do you monitor for unauthorized intrusion activity?
Information Protection
3 Do you monitor for unauthorized intrusion activity?
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Trends in Ransomware Distribution Todd O’Boyle todd@strongarm.io 25+ years combined at MITRE We’ve been studying Ransomware for the past two years This model is from helping our customers through ransomware attacks

Agenda Ransomware: Why is it working? The Ransomware Attack Cycle How can I protect myself? What’s changing?

Small and midsize businesses are being impacted by malware Problem Small and midsize businesses are being impacted by malware 43% of all attacks hit SMBs 50% of attacks were automated $8,500/per hour Cost associated with ransomware damages

Why is Ransomware Effective? Attackers are making money Low skill requirements Difficulties in investigation and prosecution Making money * Attackers are making staggering amounts of money (millions) * Automation of attacks are allowing fraudsters to scale quickly Skill requirements are lower Ransomware is franchised in a model where the software developer gets a cut Exploit kits are making distribution more effective Operators need less skill than ever before Difficult to investigate Cryptocurrency is making collection of money easier That fact plus the rise in use of “the Dark Web” to collect ransom is making it more difficult to track attackers

The Ransomware Attack Cycle Malware Distribution Targeting Encryption Recovery Phishing Embedded Keys Included Payment Malvertising Downloaded Keys Downloaded Support TODO: Consider the RDP ransomware we saw

How Can I Be Prepared? Malware Distribution Targeting Encryption Recovery User Education Patching Backups Mail Filtering URL Filtering Incident Response Anti-malware Solutions Buy Bitcoin No guarantee that victims will get their files back Paying the ransom is like funding these criminal operations Knowing that a victim will pay makes them a more attractive target One thought I want to leave you with here is that the risk and cost goes up the further to the right of this chart you go.

Improvement in phishing messages What’s Changing? Users clicking less Rise in exploit kits Improvement in phishing messages

Protections getting better What’s Changing? Users clicking less Rise in exploit kits Improvement in phishing messages Protections getting better Web based malware distribution Improvements in ransomware

What’s Changing? Users clicking less Protections getting better Rise in exploit kits Improvement in phishing messages Protections getting better Web based malware distribution Improvements in ransomware Researchers breaking ransomware Stronger key management Lower ransom prices Deleting files when ransom is not paid

What’s Changing? Users clicking less Protections getting better Rise in exploit kits Improvement in phishing messages Protections getting better Web based malware distribution Improvements in ransomware Researchers breaking ransomware Stronger key management Lower ransom prices Deleting files when ransom is not paid Growing cloud adoption Adaptation of ransomware

How Can I Be Prepared? Malware Distribution Targeting Encryption Recovery User Education Patching Backups Mail Filtering URL Filtering Incident Response Anti-malware Solutions Buy Bitcoin No guarantee that victims will get their files back Paying the ransom is like funding these criminal operations Knowing that a victim will pay makes them a more attractive target One thought I want to leave you with here is that the risk and cost goes up the further to the right of this chart you go.

Strongarm Intelligent Malware Protection Simple Get protected in under 10 minutes Prevents Stop malware from doing damage Responds Automates effort of removing malware 100% cloud-based, no hardware or software required Alerts only when real infections are detected

How it works Configure your network to point to Strongarm Strongarm intercepts threats to endpoints, stops damage from attack Strongarm alerts customer, provides details to enable simple remediation

Try Strongarm Free Today https://strongarm.io/ Todd O’Boyle todd@strongarm.io