Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
7 Effective Habits when using the Internet Philip O’Kane 1.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
Payment Fraud Trends : What Can you do? Protect Yourself and Your Business from Financial Fraud.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Done By:Salha Mohammed Obaid AL-kaabi ID:
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Lecture # 34 Privacy and Security. Passwords Spam Scams Viruses and Worms (Malware) Intellectual Property and Copyright Cookies Encryption Back-Ups.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Cyber crime & Security Prepared by : Rughani Zarana.
Internet Security facilities for secure communication.
IT security By Tilly Gerlack.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
We are here to help you… Fight something like this Brownies !
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Cybersecurity for Small Businesses Frank M. Olmstead May 5, 2016.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Information Systems Design and Development Security Precautions Computing Science.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
Computer Security Keeping you and your computer safe in the digital world.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
For more information on Rouge, visit:
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Malware attack hardening using Software Restriction Policies
What they are and how to protect against them
Ransomware 12:00 Juwan harris.
3.6 Fundamentals of cyber security
Overview 1. Phishing Scams
Cyber Security & IT: What’s Next?
Cyber Security Awareness Workshop
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Information Security Session October 24, 2005
WannaCry Ransomware Overview
CMSC 491/691 Malware Analysis
Presentation transcript:

Pirating Cyber Style

What is Ransomware? History CryptoLocker BlackHole Exploit Kit

Stops PC from Running Often Called “FBI Moneypak” or “FBI Virus” Two Types Lock Screen Ransomware Locks Screen so System Cannot be Used Encryption Ransomware Locks Files so They Cannot be Accessed Uses Scare Tactics Goal Extort Money from Victim

PC Cyborg Trojan Creator Dr. Joseph Popp Released 1989 Encrypt All Files on C Drive Krotten Released 2006 Disabled Nearly All Files Preyed on Windows Directory

WinLock Originated in Russia Restricts Access to System Displays Pornographic Images Reveton First Seen in 2012 “Police Trojan” Engaged in Illegal Activity Send Fee

CryptoLocker First Seen 2013 Use 2048-Bit RSA Key Private Key Held Threatened Erase Most Common Infection Mode – Attachment Will Run in Safe Mode

Found to have used 2764 unique victim IP's contacting the sinkholed domains Highest number was recorded on Wednesday October 16, with 1266 unique IP addresses

Top 30 countries infected

Countermeasures Do Not Open Attachments Unless Source is Verified Up-to-Date Antivirus – Maybe to Late Configure System so CryptoLocker Cannot Run Block Executables from Running in %AppData% Directory Block Executables from Running in %AppData%\* Directory Block WinRAR Attachments from Opening %Temp%\Rar\*.exe Block 7zip Attachments from Opening %Temp%\7z\*.exe Block WinZip Attachments from Opening %Temp%\wz*\*.exe Block Built-in Zip Support from Opening %Temp%\*.zip\*.exe

Launched in late 2010 – Russian Hacker Currently Most Popular Exploit Kit MySQL Backend Auto Update Contains Many Recent Java Exploits Contains Exploit for CVE (MS XML) 0-Day at the time Good JavaScript Obfuscation Many Different Payloads can be Carried

How It Works:

August to September 2012 Payloads: Money Collecting Information Stealing Click Fraud

Best Option, Avoid Getting Infected Keep Good Backups – Even in Homes Avoid Paying Ransom Paying Only Encourages More Ransomware / Malware

History: the-history-and-technology-of-ransomware/ computer-blackmail-viruses-a-history history-of-ransomware/ computer-free-of-ransomware

Reveton: function CryptoLocker: Money df

Blackhole: exploit-kit/ /Briefings/Jones/BH_US_12_Jones_State_Web_Exploits_Slides.pdf