SlideShare a Scribd company logo
1 of 7
HOW TO SPOT A RANSOMWARE EMAIL
Ransomware is a form of
malware that takes over your
computer, denying access to
your data, and demanding a
ransom payment in exchange
for its recovery.
The most common delivery
methods for this attack are
hyperlinks and attachments,
usually found in phishing
emails.
1. Check Email Addresses
The display name might look authentic, but
email addresses are much harder to falsify.
With many companies purchasing their own
domain names, attackers often have to alter
the spelling slightly – in our example you can
see that the domain has changed the initials
‘gmp’ to ‘gnp’.
2. Suspicious Attachments
If an email from a supposed service
provider includes an attachment be
wary – this is not common practice,
with most companies offering
important information in the message
itself or on a web page.
3. Inspect Before Clicking
If an email from an unknown
source includes a hyperlink, it is
best to avoid clicking it all
together. However if you think
the message may be legitimate,
just hover over the link before
clicking it to reveal the URL it
directs to.
In our example you can see that
the URL is not for GMP as it
claims and should not be trusted.
4. Scare-tactics
Ransowmare often hides within
phishing emails, which use
urgent language to rush the
target into clicking the hyperlink
or downloading the attachment
without taking the time to
properly inspect the message.
Our example uses a fake
speeding notice from the police,
which the target would likely
know they didn’t do and would
want to examine the supposed
proof.
For more topics and training material visit the Boxphish website.

More Related Content

What's hot

Is your Email Privacy Worth $0.84 a Month?
Is your Email Privacy Worth $0.84 a Month?Is your Email Privacy Worth $0.84 a Month?
Is your Email Privacy Worth $0.84 a Month?SeaNSun LLC
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Paubox, Inc.
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Pinpointe On-Demand
 
Evaluate your content and messaging
Evaluate your content and messagingEvaluate your content and messaging
Evaluate your content and messagingEmail Delivered
 
ISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better EmailsISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better EmailsSparkPost
 
Gold in your inbox - Is your email strategy future-proof?
Gold in your inbox - Is your email strategy future-proof? Gold in your inbox - Is your email strategy future-proof?
Gold in your inbox - Is your email strategy future-proof? Michelle Dassen
 
Can spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or notCan spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or notSherin Thomas
 

What's hot (12)

Is your Email Privacy Worth $0.84 a Month?
Is your Email Privacy Worth $0.84 a Month?Is your Email Privacy Worth $0.84 a Month?
Is your Email Privacy Worth $0.84 a Month?
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
Evaluate your content and messaging
Evaluate your content and messagingEvaluate your content and messaging
Evaluate your content and messaging
 
ISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better EmailsISP Mythbusters: How to Send Better Emails
ISP Mythbusters: How to Send Better Emails
 
Digital Strategy
Digital Strategy Digital Strategy
Digital Strategy
 
Gold in your inbox - Is your email strategy future-proof?
Gold in your inbox - Is your email strategy future-proof? Gold in your inbox - Is your email strategy future-proof?
Gold in your inbox - Is your email strategy future-proof?
 
Can spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or notCan spam act- check whether your email comply with it or not
Can spam act- check whether your email comply with it or not
 

Similar to GMP Ransomware Slides

Debenhams Social Engineering Slides
Debenhams Social Engineering SlidesDebenhams Social Engineering Slides
Debenhams Social Engineering SlidesAltinetLtd
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam FolderMyStockAlarm
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
CEO Fraud Slides
CEO Fraud SlidesCEO Fraud Slides
CEO Fraud SlidesAltinetLtd
 
Q&A: Tips and Tricks to Stay Out of the Spam Folder
Q&A: Tips and Tricks to Stay Out of the Spam FolderQ&A: Tips and Tricks to Stay Out of the Spam Folder
Q&A: Tips and Tricks to Stay Out of the Spam FolderSendGrid
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06Ralph Paglia
 
Ralph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess MagazineRalph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess MagazineRalph Paglia
 
R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006Ralph Paglia
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...Gangcai Lin
 
8 ways to improve email deliverability rates
8 ways to improve email deliverability rates8 ways to improve email deliverability rates
8 ways to improve email deliverability ratesLocke Truong
 
How to get your emails delivered into the inbox
How to get your emails delivered into the inboxHow to get your emails delivered into the inbox
How to get your emails delivered into the inboxRed C
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedYes Lifecycle Marketing
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt showInformz
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Manjunatha Kg
 

Similar to GMP Ransomware Slides (20)

Debenhams Social Engineering Slides
Debenhams Social Engineering SlidesDebenhams Social Engineering Slides
Debenhams Social Engineering Slides
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam Folder
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
CEO Fraud Slides
CEO Fraud SlidesCEO Fraud Slides
CEO Fraud Slides
 
Q&A: Tips and Tricks to Stay Out of the Spam Folder
Q&A: Tips and Tricks to Stay Out of the Spam FolderQ&A: Tips and Tricks to Stay Out of the Spam Folder
Q&A: Tips and Tricks to Stay Out of the Spam Folder
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
Final paper
Final paperFinal paper
Final paper
 
R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06
 
Ralph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess MagazineRalph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess Magazine
 
R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006
 
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
 
8 ways to improve email deliverability rates
8 ways to improve email deliverability rates8 ways to improve email deliverability rates
8 ways to improve email deliverability rates
 
How to get your emails delivered into the inbox
How to get your emails delivered into the inboxHow to get your emails delivered into the inbox
How to get your emails delivered into the inbox
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
End the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths DebunkedEnd the Nightmares! 10 Email Deliverability Myths Debunked
End the Nightmares! 10 Email Deliverability Myths Debunked
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt show
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

GMP Ransomware Slides

  • 1. HOW TO SPOT A RANSOMWARE EMAIL
  • 2. Ransomware is a form of malware that takes over your computer, denying access to your data, and demanding a ransom payment in exchange for its recovery. The most common delivery methods for this attack are hyperlinks and attachments, usually found in phishing emails.
  • 3. 1. Check Email Addresses The display name might look authentic, but email addresses are much harder to falsify. With many companies purchasing their own domain names, attackers often have to alter the spelling slightly – in our example you can see that the domain has changed the initials ‘gmp’ to ‘gnp’.
  • 4. 2. Suspicious Attachments If an email from a supposed service provider includes an attachment be wary – this is not common practice, with most companies offering important information in the message itself or on a web page.
  • 5. 3. Inspect Before Clicking If an email from an unknown source includes a hyperlink, it is best to avoid clicking it all together. However if you think the message may be legitimate, just hover over the link before clicking it to reveal the URL it directs to. In our example you can see that the URL is not for GMP as it claims and should not be trusted.
  • 6. 4. Scare-tactics Ransowmare often hides within phishing emails, which use urgent language to rush the target into clicking the hyperlink or downloading the attachment without taking the time to properly inspect the message. Our example uses a fake speeding notice from the police, which the target would likely know they didn’t do and would want to examine the supposed proof.
  • 7. For more topics and training material visit the Boxphish website.