RANSOMWARE:
When cyber criminals hold your
computer hostage
S U B M I T T E D TO :
P R O F. R A K H E E K U N D U
S U B M I T T E D B Y:
TA N V I G A R G - B 02 8
Content
How Steps to Don’t
Virus Preventio take if it
Introduction Types it gets
pay Example Conclusion
List n
ransom
works infected
Introduction:
• Ransomware is a form of malicious software (or malware) that, once it's
taken over your computer, threatens you with harm, usually by denying you
access to your data.
• The attacker demands a ransom from the victim, promising — not always
truthfully — to restore access to the data upon payment.
• The first ransomware in history emerged in 1989 (that’s 27 years
ago). It was called the AIDS Trojan.
• The earliest variants of ransomware were developed in the late
1980s, and payment was to be sent via snail mail.
• Today, ransomware authors order that payment be sent via
cryptocurrency or credit card.
Types of ransomware
Crypto ransomware will only
Locker ransomware will encrypt
encrypt specific, seemingly
the whole hard drive of the
important files on the computer,
computer, essentially locking the
such as word documents, PDFs
user out of the entire system
and image files.
How it works
Most ransomware infections start with:
• Email messages with attachments that try to install ransomware.
• Websites hosting exploit kits that attempt to use vulnerabilities in
web browsers and other software to install ransomware.
Once ransomware infects a device, it starts encrypting files, folders,
entire hard drive partitions using encryption algorithms like RSA or
RC4.
The USCRT, ransomware grows easily when it attacks antiquated
software.
•aRansomware-as-a-service is a cybercriminal business model in which
malware creators sell their ransomware and other services to
cybercriminals, who then operate the ransomware attacks.
• The business model also defines profit sharing between the malware
creators, ransomware operators, and other parties that may be
involved.
• Ransomware is one of the most lucrative revenue channels for
cybercriminals, so malware authors continually improve their
malware code to better target enterprise environments.
Ransomware Virus List
• Reveton(Police ransomware): locks screens instead of encrypting files.
• CryptoLocker
• CryptoLocker.F and TorrentLocker
• CryptoWall
• Fusob
• WannaCry: spread by an internet worm — software that spreads copies of
itself by hacking into other computers on a network, rather than the usual
case of prompting unsuspecting users to open attachments.
• Bad Rabbit: spread across networks using hardcoded usernames and
passwords in brute force attacks.
Prevention Of This Virus
• Back up important files regularly. Use the 3-2-1 rule. Keep three
backups of your data, on two different storage types, and at least one
backup offsite.
• Apply the latest updates to your operating systems and apps.
• Educate your employees so they can identify social engineering and
spear-phishing attacks.
• Controlled folder access. It can stop ransomware from encrypting
files and holding the files for ransom.
Steps to Take if You Do Get Infected
• Sure, it may seem scarier because of the Window it pops up, but it’s really no different.
• Remember this isn’t unlike any other piece of malware or virus that you have encountered.
Don’t Panic • First and foremost, don’t panic.
• Some infect your browser while some lock you out of some parts and can easily be removed, while the final
one can be a little more difficult.
Identify the • While others will lock up parts of your system but still others completely lock you out of everything.
Seriousness
• Reset your browser back to its default settings. The process differs between browsers but should be easy
enough to find in the Settings section of the browser.
Browser • Run your antimalware and antivirus software.
Ransomware • Reboot your computer.
a
• Reboot your machine in safe mode by holding the shift key down when you restart your system. During
the reboot process, choose safe mode in the options.
• When it loads, see if the ransomware runs. If it doesn’t, run both your antivirus and antimalware
software. This should remove the bad software.
• Reboot your computer.
Computer • Make sure the ransomware doesn’t run.
Ransomware • Rerun both your antivirus and antimalware software and remove anything that it finds just to be safe.
• This will remove everything from your machine so be prepared to reload all your software and copy
your files back to the machine.
• Using another machine, create a bootable Windows USB and reformat your computer.
• If you followed all the preventative measures we talked about above, you shouldn’t have to worry about
If All Else losing your files.
Fails
Don’t Pay The Ransom
• A key component in making ransomware successful for the attacker is
to use a payment system that is hard to trace.
• There are no guarantees the ransomware will be removed, or files will
be restored.
• The ransomware may or may not be removed after payment.
• The victim is pressured into paying for the ransomware to be
removed.
• To help you discover an answer for recuperating your information
without further financing ransomware makers, we put together a
sizeable list of ransomware decryption tools which you can use.
Who Are Involved In this Attacking?
• While initially popular in Russia, the use of ransomware scams has
grown internationally.
• Two years ago in 2017 Probably Russian and Korean countries hackers
are hacked more than 90 countries computers.
• Wide-ranging attacks involving encryption-based ransomware began
to increase through Trojans such as CryptoLocker.
Conclusion
• Ransomware has been a growing problem for IT administrators and home
users alike.
• Today, it is one of the biggest threats in computer security.
• Ransomware calls are more annoying than anything else, and haven’t had
too much trouble removing them when needed, but it does take time.
• After all, virus and malware scans can sometimes take hours to run so they
end up costing users and businesses money whether they pay the ransom or
not.
• Remember, preventing the infection is your best defense, so always run
high quality antivirus software and back up your system. If you don’t, you
could be in for a rude awakening.
THANK YOU!!!