SlideShare a Scribd company logo
1 of 17
Ransomware :
A cyber crime without solution ?
Adv. Prashant Mali
Masters in Computer Science(MSc.), Masters in Law(LLM),
Certified Computer Forensics Professional(CCFP)
High Court Lawyer – Mumbai, India
Speaker, Author & Expert in Cyber Law & Cyber Security
President – Cyber Law Consulting(Advocates & Attorneys)
What is Ransomware ?
• Ransomware is a sophisticated piece of
malware that blocks the victim’s access to
his/her files.
There are two types of ransomware in circulation:
• Encrypting ransomware, which incorporates advanced
encryption algorithms. It’s designed to block system files and
demand payment to provide the victim with the key that can
decrypt the blocked content. Examples include CryptoLocker,
Locky, CrytpoWall and more.
• Locker ransomware, which locks the victim out of the
operating system, making it impossible to access the desktop
and any apps or files. The files are not encrypted in this case,
but the attackers still ask for a ransom to unlock the infected
computer. Examples include the police-themed ransomware
or Winlocker.
Ransomware A leading Cyberthreat
• Ransomware, specifically cryptographic
ransomware, has quickly become one of the
greatest cyberthreats facing organizations
around the world.
• It is largely victim agnostic, spanning the
globe and affecting all major industry
verticals. Small organizations, large
enterprises, individual home users - all are
potential targets.
Ransomware : Characteristics
• It features unbreakable encryption, which means that you can’t
decrypt the files on your own (there are various decryption tools
released by cyber security researchers – more on that later);
• It has the ability to encrypt all kinds of files, from documents to
pictures, videos, audio files and other things you may have on your
PC;
• It can scramble your file names, so you can’t know which data was
affected. This is one of the social engineering tricks used to confuse
and coerce victims into paying the ransom;
• It will add a different extension to your files, to sometimes signal a
specific type of ransomware strain;
• It will display an image or a message that lets you know your data
has been encrypted and that you have to pay a specific sum of
money to get it back;
• It requests payment in Bitcoins, because this crypto-currency
cannot be tracked by cyber security researchers or law
enforcements agencies;
Ransomware : Characteristics
• Usually, the ransom payments has a time-limit, to add another level of
psychological constraint to this extortion scheme. Going over the deadline
typically means that the ransom will increase, but it can also mean that
the data will be destroyed and lost forever.
• It uses a complex set of evasion techniques to go undetected by
traditional antivirus (more on this in the “Why ransomware often goes
undetected by antivirus” section);
• It often recruits the infected PCs into botnets, so cyber criminals can
expand their infrastructure and fuel future attacks;
• It can spread to other PCs connected in a local network, creating further
damage;
• It frequently features data exfiltration capabilities, which means that
ransomware can extract data from the affected computer (usernames,
passwords, email addresses, etc.) and send it to a server controlled by
cyber criminals;
• It sometimes includes geographical targeting, meaning the ransom note is
translated into the victim’s language, to increase the chances for the
ransom to be paid.
Impact of Ransomeware
• The financial impact of ransomware is
enormous, with several high-profile infections
leading to millions of dollars in ransom paid to
attackers.
• Ransomware is one of the few cybercriminal
business models where the same attack could
harm a Fortune 500 company, a local
restaurant down the street, and your
grandmother.
Image source: CERT-RO
How does ransomware infect?
• Initially, the victim receives an email which includes a
malicious link or an malware-laden attachment. Alternatively, the
infection can originate from amalicious website that delivers a
security exploit to create a backdoor on the victim’s PC by using
a vulnerable software from the system.
• If the victim clicks on the link or downloads and opens the
attachment, a downloader (payload) will be placed on the affected PC.
• The downloader uses a list of domains or C&C servers controlled by
cyber criminals to download the ransomware program on the system.
• The contacted C&C server responds by sending back the requested
data, in our case, the ransomware.
• The ransomware starts to encrypt the entire hard disk content,
personal files and sensitive information. Everything, including data
stored in cloud accounts (Google Drive, Dropbox) synced on the PC. It
can also encrypt data on other computers connected in the local
network.
• A warning pops up on the screen with instructions on how to pay for
the decryption key.
Ransomeware: Infection Example
Ransomeware : Names
• TorrentLocker
• CTB Locker
• CryptoWall
• Reveton
• TeslaCrypt
• Locky
New Ransomeware’s are launched at
intervals, so Locky’s descendant, Zepto
made its debut in early June 2016.
Ransomware: How it spreads ?
Cybercriminals to spread ransomware:
• Spam email campaigns that contain malicious links or attachments;
• Security exploits in vulnerable software;
• Internet traffic redirects to malicious websites;
• Legitimate websites that have malicious code injected in their web
pages;
• Drive-by downloads;
• Malvertising campaigns;
• SMS messages (which apply to ransomware that targets mobile devices);
• Botnets;
• Self-propagation (spreading from one infected computer to another);
• Affiliate schemes in ransomware-as-a-service (earning a share of the
profits by helping further spread ransomware).
Ransom Payment Mechanism
• The cryptocurrency Bitcoin has provided a
payment mechanism that is fueling the
success of this scheme. The payment
mechanisms that early forms of ransomware
relied on have been shut down or forced to
regulate their payments, but Bitcoin has no
central authority against which law
enforcement can take action.
Target Operating System
• Thus far, ransomware attacks
have primarily targeted
Windows-based systems, but
adversaries have begun
branching out to target other
devices, such as attacks against
the Mac® OS X® operating
system.
Ransomeware: Prevention
• Do not store important data only locally on PC.
• Have two backups of your data: on an external hard drive
and in the cloud – Dropbox /Google Drive/etc.
• Don’t turn on the Dropbox /Google Drive/ OneDrive/etc.
application on your computer by default. only open them
once a day, to sync your data, and close them once this is
done.
• Keep Operating system and the software you use is
updated, including the latest security patches.
• Don’t use an administrator account on your computer for
daily usage
• Turn off macros in the Microsoft Office suite – Word, Excel,
PowerPoint, etc.
Ransomeware: Prevention
• Remove Adobe Flash, Adobe Reader, Java and Silverlight plugins
from your browsers use only need based.
• Adjust browsers’ security and privacy settings for increased
protection.
• Remove outdated plugins and add-ons from browsers.
• Always use an “ad blocker” to avoid the threat of potentially
malicious ads.
• Never open spam emails or emails from unknown senders.
• Never download attachments from spam emails or suspicious
emails.
• Never click links in spam emails or suspicious emails.
• Use paid and licensed Anti virus software and keep it updated
What can be done ?
• Until organizations around the world
adopt a prevention mindset, and stop
paying ransoms to retrieve their data,
this criminal scheme will continue to
threaten all Internet-connected devices.
• Ransomware has brought extortion to a
global scale, and it’s up to all of us,
users, business-owners and decision-
makers, to disrupt it.
Thank you
Adv. Prashant Mali [BSc.(Phy.), MSc.(Computer Sci.),CCFP,LLM]
President - Cyber Law Consulting
Legal Counsel, Author, Speaker & Expert
Mob: +91-9821763157
facebook.com/cyberlawconsultant | Twitter: @CybreMahaGuru
Web : www.prashantmali.com
www.cyberlawconsulting.com
cyberlawconsulting@gmail.com

More Related Content

What's hot (20)

Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Ransomware
RansomwareRansomware
Ransomware
 
Malware
MalwareMalware
Malware
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
System hacking
System hackingSystem hacking
System hacking
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Similar to Ransomware : A cyber crime without solution ? by Prashant Mali

How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against RansomwareKevo Meehan
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attackdoiss delhi
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware PresentationLucy Denver
 

Similar to Ransomware : A cyber crime without solution ? by Prashant Mali (20)

How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
Malicious
MaliciousMalicious
Malicious
 

More from Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM] (8)

Legality of bitcoins by Prashant Mali
Legality of bitcoins by Prashant MaliLegality of bitcoins by Prashant Mali
Legality of bitcoins by Prashant Mali
 
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
 
Ecommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant maliEcommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant mali
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 

Recently uploaded

Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 

Ransomware : A cyber crime without solution ? by Prashant Mali

  • 1. Ransomware : A cyber crime without solution ? Adv. Prashant Mali Masters in Computer Science(MSc.), Masters in Law(LLM), Certified Computer Forensics Professional(CCFP) High Court Lawyer – Mumbai, India Speaker, Author & Expert in Cyber Law & Cyber Security President – Cyber Law Consulting(Advocates & Attorneys)
  • 2. What is Ransomware ? • Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files. There are two types of ransomware in circulation: • Encrypting ransomware, which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Examples include CryptoLocker, Locky, CrytpoWall and more. • Locker ransomware, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer. Examples include the police-themed ransomware or Winlocker.
  • 3. Ransomware A leading Cyberthreat • Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyberthreats facing organizations around the world. • It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users - all are potential targets.
  • 4. Ransomware : Characteristics • It features unbreakable encryption, which means that you can’t decrypt the files on your own (there are various decryption tools released by cyber security researchers – more on that later); • It has the ability to encrypt all kinds of files, from documents to pictures, videos, audio files and other things you may have on your PC; • It can scramble your file names, so you can’t know which data was affected. This is one of the social engineering tricks used to confuse and coerce victims into paying the ransom; • It will add a different extension to your files, to sometimes signal a specific type of ransomware strain; • It will display an image or a message that lets you know your data has been encrypted and that you have to pay a specific sum of money to get it back; • It requests payment in Bitcoins, because this crypto-currency cannot be tracked by cyber security researchers or law enforcements agencies;
  • 5. Ransomware : Characteristics • Usually, the ransom payments has a time-limit, to add another level of psychological constraint to this extortion scheme. Going over the deadline typically means that the ransom will increase, but it can also mean that the data will be destroyed and lost forever. • It uses a complex set of evasion techniques to go undetected by traditional antivirus (more on this in the “Why ransomware often goes undetected by antivirus” section); • It often recruits the infected PCs into botnets, so cyber criminals can expand their infrastructure and fuel future attacks; • It can spread to other PCs connected in a local network, creating further damage; • It frequently features data exfiltration capabilities, which means that ransomware can extract data from the affected computer (usernames, passwords, email addresses, etc.) and send it to a server controlled by cyber criminals; • It sometimes includes geographical targeting, meaning the ransom note is translated into the victim’s language, to increase the chances for the ransom to be paid.
  • 6. Impact of Ransomeware • The financial impact of ransomware is enormous, with several high-profile infections leading to millions of dollars in ransom paid to attackers. • Ransomware is one of the few cybercriminal business models where the same attack could harm a Fortune 500 company, a local restaurant down the street, and your grandmother.
  • 8. How does ransomware infect? • Initially, the victim receives an email which includes a malicious link or an malware-laden attachment. Alternatively, the infection can originate from amalicious website that delivers a security exploit to create a backdoor on the victim’s PC by using a vulnerable software from the system. • If the victim clicks on the link or downloads and opens the attachment, a downloader (payload) will be placed on the affected PC. • The downloader uses a list of domains or C&C servers controlled by cyber criminals to download the ransomware program on the system. • The contacted C&C server responds by sending back the requested data, in our case, the ransomware. • The ransomware starts to encrypt the entire hard disk content, personal files and sensitive information. Everything, including data stored in cloud accounts (Google Drive, Dropbox) synced on the PC. It can also encrypt data on other computers connected in the local network. • A warning pops up on the screen with instructions on how to pay for the decryption key.
  • 10. Ransomeware : Names • TorrentLocker • CTB Locker • CryptoWall • Reveton • TeslaCrypt • Locky New Ransomeware’s are launched at intervals, so Locky’s descendant, Zepto made its debut in early June 2016.
  • 11. Ransomware: How it spreads ? Cybercriminals to spread ransomware: • Spam email campaigns that contain malicious links or attachments; • Security exploits in vulnerable software; • Internet traffic redirects to malicious websites; • Legitimate websites that have malicious code injected in their web pages; • Drive-by downloads; • Malvertising campaigns; • SMS messages (which apply to ransomware that targets mobile devices); • Botnets; • Self-propagation (spreading from one infected computer to another); • Affiliate schemes in ransomware-as-a-service (earning a share of the profits by helping further spread ransomware).
  • 12. Ransom Payment Mechanism • The cryptocurrency Bitcoin has provided a payment mechanism that is fueling the success of this scheme. The payment mechanisms that early forms of ransomware relied on have been shut down or forced to regulate their payments, but Bitcoin has no central authority against which law enforcement can take action.
  • 13. Target Operating System • Thus far, ransomware attacks have primarily targeted Windows-based systems, but adversaries have begun branching out to target other devices, such as attacks against the Mac® OS X® operating system.
  • 14. Ransomeware: Prevention • Do not store important data only locally on PC. • Have two backups of your data: on an external hard drive and in the cloud – Dropbox /Google Drive/etc. • Don’t turn on the Dropbox /Google Drive/ OneDrive/etc. application on your computer by default. only open them once a day, to sync your data, and close them once this is done. • Keep Operating system and the software you use is updated, including the latest security patches. • Don’t use an administrator account on your computer for daily usage • Turn off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc.
  • 15. Ransomeware: Prevention • Remove Adobe Flash, Adobe Reader, Java and Silverlight plugins from your browsers use only need based. • Adjust browsers’ security and privacy settings for increased protection. • Remove outdated plugins and add-ons from browsers. • Always use an “ad blocker” to avoid the threat of potentially malicious ads. • Never open spam emails or emails from unknown senders. • Never download attachments from spam emails or suspicious emails. • Never click links in spam emails or suspicious emails. • Use paid and licensed Anti virus software and keep it updated
  • 16. What can be done ? • Until organizations around the world adopt a prevention mindset, and stop paying ransoms to retrieve their data, this criminal scheme will continue to threaten all Internet-connected devices. • Ransomware has brought extortion to a global scale, and it’s up to all of us, users, business-owners and decision- makers, to disrupt it.
  • 17. Thank you Adv. Prashant Mali [BSc.(Phy.), MSc.(Computer Sci.),CCFP,LLM] President - Cyber Law Consulting Legal Counsel, Author, Speaker & Expert Mob: +91-9821763157 facebook.com/cyberlawconsultant | Twitter: @CybreMahaGuru Web : www.prashantmali.com www.cyberlawconsulting.com cyberlawconsulting@gmail.com