Ransomware: What it is and Strategies to prevent infection
-
Upload
donald-mcarthur -
Category
Internet
-
view
170 -
download
3
Transcript of Ransomware: What it is and Strategies to prevent infection
![Page 1: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/1.jpg)
RANSOMWARE:WHAT IT IS AND STRATEGIESTO PREVENT INFECTION
DONALD MCARTHUR
![Page 2: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/2.jpg)
AGENDA• What is RansomWare
• History of RansomWare
• How RansomWare is
Deployed
• Strategies to Combat
RansomWare
• What to do if you are
infected
![Page 3: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/3.jpg)
RANSOMWARE IS A TYPE OFMALWARE THAT RESTRICTSACCESS TO THE INFECTED
COMPUTER SYSTEM IN SOMEWAY, AND DEMANDS THE
USER PAY.
![Page 4: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/4.jpg)
TYPES OF RANSOMWARE
• THE MOST COMMON TYPE DISPLAYS MESSAGES INTENDED TOCOAX THE USER INTO PAYING (EX. YOUR MACHINE IS INFECTED!)
• MORE DESTRUCTIVE TYPES ENCRYPT FILES ON THE SYSTEM'SHARD DRIVE
• A NEW RELEASED VERSION ACTUALLY LOCKS THE OPERATINGSYSTEM
![Page 5: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/5.jpg)
HISTORY OF CRYPTO RANSOMWARE
• FIRST REPORTED OCCURRENCE: CRYPTOLOCKER IN 2013
• INITIALLY POPULAR IN RUSSIA BUT QUICKLY WENTINTERNATIONAL
• THE ORIGINAL CRYPTOLOCKER IN 2013 MADE AN ESTIMATED $3MILLION
• VARIANTS SINCE 2013 HAVE MADE AN ESTIMATED $30 MILLION
![Page 6: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/6.jpg)
ATTACHMENTS ADVERTISEMENTS SECURITY HOLES
Most come through as
ZIP files or "invoices"
Ad Networks are often
targeted and exploited
for these types of
attacks.
Java, Flash, Macros
(Word, Excel)
Banner Ads
HOW RANSOMWARE IS DEPLOYED
![Page 7: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/7.jpg)
WHAT DOESIT ENCRYPT?This can vary depending on the
variant but usually:
• Documents
• File Drives
• Network Shares
It has been known to Encrypt
• Operating Systems
• Cloud Sync Files
• Backups
![Page 8: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/8.jpg)
WHY DOES IT SUCCEED?
![Page 9: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/9.jpg)
DOES NOTACT LIKE AVIRUS
• Runs as a logged in user
• Morphs quickly so AV cannot
detect
![Page 10: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/10.jpg)
BACKUPS
Honestly, How often do you
backup?
How often do you test your
backup?
![Page 11: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/11.jpg)
SECURITYHOLES
If you are using a computer you
have to keep up with software
updates.
That includes but not limited to:
• Windows
• Office
• Flash
• Java
• Silverlight
![Page 12: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/12.jpg)
STRATEGIES TO COMBAT RANSOMWARE
![Page 13: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/13.jpg)
TRAININGHOW TO SPOT THREATS
![Page 14: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/14.jpg)
ATTACHMENTSONLY OPEN THEM IF YOU WERE EXPECTING THEM.
![Page 15: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/15.jpg)
BACKUP• FULL BACK UP WITH ROTATION OFFS ITE• CLOUD BACKUP WITH “VERS IONING” TURNED ON• EXTERNAL HARD DR IVE ONLY PLUGGED IN WHEN BACKING UP
![Page 16: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/16.jpg)
UPDATESI F YOU ARE US ING FLASH OR JAVA DON’T IGNORE YOUR
UPDATES !
![Page 17: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/17.jpg)
CHROMEUSE CHROME INSTEAD OF INTERNET EXPLORER WHERE POSS IBLE
INSTALL FREE EXTENSIONS L IKE AD BLOCK PLUS , IE TAB , AND AVIRAANTIVIRUS
![Page 18: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/18.jpg)
ANTI - VIRUS & MALWARETHE FREE STUFF IS GREAT JUST MAKE SURE IT 'S ENABLED
AND UPDATED .
![Page 19: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/19.jpg)
FIREWALL
A F IREWALL IS YOUR F IRST L INE OF DEFENSE AGAINSTANY ATTACK .
![Page 20: Ransomware: What it is and Strategies to prevent infection](https://reader031.fdocuments.net/reader031/viewer/2022030312/58edc3661a28ab50158b45b1/html5/thumbnails/20.jpg)
Power off your computerimmediately.
Power Down01
Call Person in Charge of IT
Call For Help02
Everyone makes mistakes BE HONEST aboutwhat happened, what you saw and what you
were doing.
Describe03
INFECTEDW H A T T O D OI F Y O U A R E