A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.

Slides:



Advertisements
Similar presentations
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Advertisements

Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Unit 18 Data Security 1.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
 What is electronic data?  Information stored electronically, e.g. pictures, music, documents, etc.  Where can you store your data?  Cell phones 
The University of Kansas Medical Center Shadow Experience Training.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber Crimes.
Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Unit 2 - Hardware Computer Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Types of Electronic Infection
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer crimes.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Society & Computers PowerPoint
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Cyber Attack – Not a case of if, but when! Housing Technology 2016 Kevin Doran – Chief Technology Officer Tim Cowland – Principal Consultant.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
California Telehealth Network Annual Overview.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Ransomware 12:00 Juwan harris.
Ransomware, Hack and Breach: The Year of the Healthcare Breach
CYBER SECURITY...
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Cyber Security & IT: What’s Next?
Trends in Ransomware Distribution
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
How Cyber Security vulnerabilities will shape the future of Healthcare Sector Globally?
IT Security awareness Training.
Take Cyber Security “TO HEART”
WannaCry Ransomware Overview
Mitigating Ransomware
Ransomware in Web Apps OWASP Singapore.
Top Ten Cyber Security Hygiene Tips
Faculty of Science IT Department By Raz Dara MA.
Las Positas College Flex Day
How to keep the bad guys out and your data safe
Tom Murphy Chief Information Security Officer
Information Security – Sep 18
The Secure Contingency Plan
No!. [NEXT SLIDE] LOGO HERE.
CSCD 434 Spring 2019 Lecture 10 Attacks for Profit Ransomeware 1.
Cybersecurity Simplified: Ransomware
Presentation transcript:

A Growing Threat Debbie Russ 1/28/2015

What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) to restore access.  Encrypting - encrypts files on the victims computer and then demands money for a private key to decrypt the files.  Non-encrypting - restricts access to the computer often by setting the Windows shell to itself or modifying the boot record until a “fix” is purchased from the creator(s).

Examples of Ransomware Reveton CryptoLocker threats

Reveton Nicknamed the “police trojan” Displays a message from “authorities” (local police station, FBI, etc.) saying that your computer has been locked because illegal material was found and the user must pay a fine to have it unlocked  Pornographic material  Pirated music, movies, etc. Often displays the correct name and logo for area authorities Can contain footage from the computer’s webcam to make the user believe their actions are being recorded All bad??

Reveton

CryptoLocker Displays a message saying that your computer has been encrypted and you must pay to obtain the key to decrypt your files If not paid within a certain amount of time (usually 72 hours) the key will be destroyed More recent versions allow users to decrypt a few files for free to prove they can be recovered Creator(s) have been known to make over $30 million in just a few months

CryptoLocker

Threats Sony  Three days before the attacks that crippled Sony Pictures, the hackers sent an to two executives that claimed to “do great damage to the company” if they weren’t paid  Apparently they didn’t pay…. Clay County Hospital in Flora, Illinois  The hospital received an containing patient names, addresses, Social Security numbers and dates of birth  The sender threatened to make the information public unless “a substantial payment from the hospital” was made

Predictions for 2015 The healthcare industry is at a particularly high risk  The mandate to move to electronic records  The sensitive nature of health care data  The immaturity of the information security practices that exist in the health care industry today  The cost of compromise could range from an inconvenience to loss of life Targeted extortion-ware  An expansion on ransomware that targets users that have something to hide and threatens to expose evidence of infidelity, incriminating data, etc.  Much more targeted but the payment amount requested will be much higher per victim  Victims are much less likely to involve law enforcement due to the sensitive nature of the data

Predictions for 2015 cont… McAfee predicts that ransomware variants will specifically target endpoints that subscribe to cloud- based storage solutions  Once the endpoint has been infected, the ransomware will attempt to exploit the logged-on user’s stored credentials to also infect backed-up cloud storage data McAfee also predicts a rise in ransomware targeting mobile devices using virtual currency as the ransom payment method.  Bitcoin has become a very popular method for payment requests because the requestor can remain anonymous

Links SC Magizine - Expect more ransomware and 'extortionwoare' in 2015 SC Magizine - Expect more ransomware and 'extortionwoare' in 2015 McAfee Threats Predicitions The Sony Hack and the Rise of Cyber Ransoms New CTB-Locker Variant Allows Victims to Recover 5 Files for Free New CTB-Locker Variant Allows Victims to Recover 5 Files for Free Patient data held for ransom at rural Illinois hospital SentinelOne Labs - Advanced Threat Intelligence Report Predictions SentinelOne Labs - Advanced Threat Intelligence Report Predictions Ransomware to Target Cloud Storage in 2015 – Are You Ready? Ransomware to Target Cloud Storage in 2015 – Are You Ready?