SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Ransomware
Trade Association of Information Technology (TAIT)
Knowledge Series
Joel Divekar
Mumbai
18th Nov 2016
What is Ransomware ?
Is a type of Malware,
that infects a computer
&
restricts access to it
until a ransom is paid to unlock it
How did it start ?
In 1989, a floppy disk labelled
“AIDS information – Introductory Diskette”
was distributed to
20,000 participants from 90 countries
after WHO International AIDS conference
And ...
The “AIDS Trojan” transmitted with use floppy disk
got activated after 90 reboots ....
and encrypted all the victim’s data ....
Asking them to pay $189 to an address in Panama
With a message ...
How did it come in my system?
Phishing emails containing malicious attachments
Downloading malicious files
Clicking on malicious ads
Unknowingly visiting an infected website which
downloads and installs malware
Web-based IM applications
Exploiting Web Servers to gain access into an
Organisation’s network
Ransomware after effects
Creates fear and panic
Tricks user to click on links
Ask to pay a Ransom
What happens to infected system
System infected with Ransomware
may also get infected by other malware
In case of Cryptolocker,
the malicious attachment also contains
Uparte, a downloader,
which infects the system with
GameOver Zeus Trojan
which steals users banking information
Should I pay Ransom?
Paying Ransom does not guarantee
that you would get your files back
Decryption of files does not mean
your system is not infected with malware
How2 avoid Ransomware ?
Use tools to filter unwanted mails
Use Ad blockers to block malacious ads
Install Firewall, AntiVirus,
AntiMalware & AntiRansonware
Update and patch system and applications
Most important ... Do daily data backup
Use IT Automation tools extensively
Thanks
Joel Divekar
Mumbai, India
+91 9920208223
joeldivekar.blogspot.com
www.linkedin.com/in/joeldivekar
www.slideshare.net/JoelDivekar
IT Automation / DevOps / Software Development / Training

Contenu connexe

Tendances

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virusCassidy Lajangang
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 
Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?charliedavibrown
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attackdoiss delhi
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus Ranjeta Muniandy
 

Tendances (19)

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?
 
Wanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awarenessWanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awareness
 
RANSOMWARE
RANSOMWARERANSOMWARE
RANSOMWARE
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Backdoor
BackdoorBackdoor
Backdoor
 
What is Malware?
What is Malware? What is Malware?
What is Malware?
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

En vedette

11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack 11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack Kris Buytaert
 
Neuswyft presentation 2.12
Neuswyft presentation 2.12Neuswyft presentation 2.12
Neuswyft presentation 2.12Stephen Thompson
 
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyJoel Divekar
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchainEmrah Semiz
 
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...BigchainDB
 
Technology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationTechnology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationVinod Kumar Nerella
 
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlasBitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlasRuben Chavarri
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon
 
Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain SYSPRO
 
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...SlashData
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad SarangNinad Sarang
 
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale InsuranceChain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale InsurancePwC
 
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017BigchainDB
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareRuchi Dass
 
2017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 20172017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 2017PwC
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureMelanie Swan
 

En vedette (20)

11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack 11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack
 
Neuswyft presentation 2.12
Neuswyft presentation 2.12Neuswyft presentation 2.12
Neuswyft presentation 2.12
 
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
 
Technology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationTechnology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentation
 
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlasBitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
 
Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain
 
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
 
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale InsuranceChain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
 
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and Healthcare
 
2017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 20172017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 2017
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 

Similaire à Ransomware - TAIT knowledge Series

Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threatsEC-Council
 
Malware And Its Effects On Society
Malware And Its Effects On SocietyMalware And Its Effects On Society
Malware And Its Effects On SocietyAmelia Richardson
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24Muhammad Zain
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
What Does Crime Use Zeus Trojan
What Does Crime Use Zeus TrojanWhat Does Crime Use Zeus Trojan
What Does Crime Use Zeus TrojanRobynn Dixon
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
Malware And Its Effects On Computers
Malware And Its Effects On ComputersMalware And Its Effects On Computers
Malware And Its Effects On ComputersLisa Diaz
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?Sunjoonah Kambbs
 

Similaire à Ransomware - TAIT knowledge Series (20)

Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
Malware And Its Effects On Society
Malware And Its Effects On SocietyMalware And Its Effects On Society
Malware And Its Effects On Society
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Essay On Malware
Essay On MalwareEssay On Malware
Essay On Malware
 
Malwares
MalwaresMalwares
Malwares
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What Does Crime Use Zeus Trojan
What Does Crime Use Zeus TrojanWhat Does Crime Use Zeus Trojan
What Does Crime Use Zeus Trojan
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Malware And Its Effects On Computers
Malware And Its Effects On ComputersMalware And Its Effects On Computers
Malware And Its Effects On Computers
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Ransomware
RansomwareRansomware
Ransomware
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 

Dernier

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 

Dernier (20)

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 

Ransomware - TAIT knowledge Series

  • 1. Ransomware Trade Association of Information Technology (TAIT) Knowledge Series Joel Divekar Mumbai 18th Nov 2016
  • 2. What is Ransomware ? Is a type of Malware, that infects a computer & restricts access to it until a ransom is paid to unlock it
  • 3. How did it start ? In 1989, a floppy disk labelled “AIDS information – Introductory Diskette” was distributed to 20,000 participants from 90 countries after WHO International AIDS conference
  • 4. And ... The “AIDS Trojan” transmitted with use floppy disk got activated after 90 reboots .... and encrypted all the victim’s data .... Asking them to pay $189 to an address in Panama
  • 6. How did it come in my system? Phishing emails containing malicious attachments Downloading malicious files Clicking on malicious ads Unknowingly visiting an infected website which downloads and installs malware Web-based IM applications Exploiting Web Servers to gain access into an Organisation’s network
  • 7. Ransomware after effects Creates fear and panic Tricks user to click on links Ask to pay a Ransom
  • 8. What happens to infected system System infected with Ransomware may also get infected by other malware In case of Cryptolocker, the malicious attachment also contains Uparte, a downloader, which infects the system with GameOver Zeus Trojan which steals users banking information
  • 9. Should I pay Ransom? Paying Ransom does not guarantee that you would get your files back Decryption of files does not mean your system is not infected with malware
  • 10. How2 avoid Ransomware ? Use tools to filter unwanted mails Use Ad blockers to block malacious ads Install Firewall, AntiVirus, AntiMalware & AntiRansonware Update and patch system and applications Most important ... Do daily data backup Use IT Automation tools extensively
  • 11. Thanks Joel Divekar Mumbai, India +91 9920208223 joeldivekar.blogspot.com www.linkedin.com/in/joeldivekar www.slideshare.net/JoelDivekar IT Automation / DevOps / Software Development / Training