SlideShare une entreprise Scribd logo
1  sur  9
Mumbere Joab
RANSOMWARE ATTACKS
Case study: The Reveton Ransomware Attacks
Reveton
What is a Ransomware?
Ransomware is malware for data kidnapping or an exploit in which the
attacker encrypts the victim's data and demands payment for the
decryption key.
Why are Ransomware attacks on the rise?
 Rising Number Of Unemployed I.T Geeks.
As is the case with many crimes committed outside the Internet, money is a
major motivator for many cyber criminals. Especially when the dangers of
criminality are less apparent when you're hiding behind a network, the
perception of low risk and very high financial reward prompts many cyber
criminals to engage in Ransomware attacks
 Weak Organizational policies on privacy and access of I.T Infrastructure.
This is involves granting access to unauthorized people who may end up
using that opportunity to carryout the attack if they are able to access the severs ,
network or even workstations .
 Increasing use of the internet by organizations and individuals
The Increased use the internet by organizations and individuals to store and
share sensitive information creates a favorable conditions for the attackers to lay
there traps because they know how sensitive the information is to victim and
they assured of a big pay at the end of the day while on panics to restore their
information.
 Increasing use of counterfeit software especially in developing countries.
Mostly of these commonly know as Cracks have contain malicious scripts that
can be used to set a Ransomware attack on the users as long as they are
connected on the network
Why are Ransomware attacks on the rise?
 Structurally motivated attacks
Beyond the causes that motivate the attackers, the environment in
which the attack is committed also serves to explain the prevalence of
the phenomenon. While more and more personal and sensitive
information is stored online, this increases the potential rewards for a r
ansom attack. Neither computer security nor applications like email
filters have improved dramatically in terms of coverage. According to
the anti-virus manufacturer Norton, for example, as many as 41 percen
t of computers did not have up-to-date security protection in 2012.
 Personally motivated attacks
The attackers what they do, including their crimes is often the cause of
personal emotions and vendettas. From the disgruntled employee ,
installing a malware on office computers to a jealous boyfriend
hacking into a girlfriend's social media accounts or a teenager taking
down a school website just to prove that he could do it, many cyber
crimes are essentially crimes of passion committed over the Internet.
Many of these crimes, however, can still have very serious impacts and
cause considerable property damage.
What can you do to prevent Ransomware
attacks on your own computer?
• Make sure Your antivirus is updated with a real time protection mechanism and internet
Security plans .
• Always block Pop Ups from your web browsers since most of there attacks are triggered
through unnecessary pop ups.
• Always install updated Software patches from the Operating system venders because they
contain some of these security mechanisms that protect your computer from any possible
attack.
• For Organization they should have a well developed IT policy to restrict access to certain
untrusted sites to avoid any possible attacks.
• A good relationship between the company and IT officers is step number one toward avoid
ing any sorts on intended attacks
• Before you are attacked, a back and recover plan is always paramount for the safety of one
s data. So don’t wait to be attacked and then remember to backup
• Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena
ble one see potentially dangerous files
• If you discover a rogue or unknown process on your machine, disconnect it immediately
from the internet or other network connections such as Wi-Fi this will prevent the infection
from spreading.
How do you think victims should
respond to Ransomware attacks?
 Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you
can realize that it was just a mare attack you find your self paying for what you didn’t
commit .
 Shutdown the infected machine to avoid further encryption of files.
 Disconnect the affected device from the network to a further attack on the other devices
on the network.
 Don’t pay up any amount of money since you already know that the guys are crooks
 Taking to a technician you trust for help.
 Try using boot-time antivirus Sophos Antivirus.
 Clean Up the infected Machine and use a data recovery software to recover your
information.
 For Organization follow the disaster recovery plan it could have a fast solution to avoid ma
ss loss of data and down times.
Do they have an ethical obligation
to future victims?
Yes they do..
 A Backup plan is always necessary before any attack to avoid data loss in case there is an
attack.
 Using an Updated antivirus and anti malware software is necessary to detect and block any
attacks .
 Computer users should avoid using counterfeited software because they are used as honey
ports by attacks.
 Computer users should enable the display of file extensions so that they can be able to tell
which files are dangerous to there computer systems as away to limit chance of being
attacked
 Research is necessary to keep computer users informed about the on going attacks, how
to prevents and solve these attacks in case they are meet.
 Internet users should always avoid responding positively to scareware for these are ways
through which ransom attacks are triggered
Ransomware attacks reveton

Contenu connexe

Tendances

Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
Bhanja Kishor Samudra
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 

Tendances (20)

Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Salami attack
Salami attackSalami attack
Salami attack
 

Similaire à Ransomware attacks reveton

Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
anandanand521251
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 

Similaire à Ransomware attacks reveton (20)

Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Synchronized security
Synchronized securitySynchronized security
Synchronized security
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 

Dernier

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Dernier (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 

Ransomware attacks reveton

  • 1. Mumbere Joab RANSOMWARE ATTACKS Case study: The Reveton Ransomware Attacks
  • 3. What is a Ransomware? Ransomware is malware for data kidnapping or an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key.
  • 4. Why are Ransomware attacks on the rise?  Rising Number Of Unemployed I.T Geeks. As is the case with many crimes committed outside the Internet, money is a major motivator for many cyber criminals. Especially when the dangers of criminality are less apparent when you're hiding behind a network, the perception of low risk and very high financial reward prompts many cyber criminals to engage in Ransomware attacks  Weak Organizational policies on privacy and access of I.T Infrastructure. This is involves granting access to unauthorized people who may end up using that opportunity to carryout the attack if they are able to access the severs , network or even workstations .  Increasing use of the internet by organizations and individuals The Increased use the internet by organizations and individuals to store and share sensitive information creates a favorable conditions for the attackers to lay there traps because they know how sensitive the information is to victim and they assured of a big pay at the end of the day while on panics to restore their information.  Increasing use of counterfeit software especially in developing countries. Mostly of these commonly know as Cracks have contain malicious scripts that can be used to set a Ransomware attack on the users as long as they are connected on the network
  • 5. Why are Ransomware attacks on the rise?  Structurally motivated attacks Beyond the causes that motivate the attackers, the environment in which the attack is committed also serves to explain the prevalence of the phenomenon. While more and more personal and sensitive information is stored online, this increases the potential rewards for a r ansom attack. Neither computer security nor applications like email filters have improved dramatically in terms of coverage. According to the anti-virus manufacturer Norton, for example, as many as 41 percen t of computers did not have up-to-date security protection in 2012.  Personally motivated attacks The attackers what they do, including their crimes is often the cause of personal emotions and vendettas. From the disgruntled employee , installing a malware on office computers to a jealous boyfriend hacking into a girlfriend's social media accounts or a teenager taking down a school website just to prove that he could do it, many cyber crimes are essentially crimes of passion committed over the Internet. Many of these crimes, however, can still have very serious impacts and cause considerable property damage.
  • 6. What can you do to prevent Ransomware attacks on your own computer? • Make sure Your antivirus is updated with a real time protection mechanism and internet Security plans . • Always block Pop Ups from your web browsers since most of there attacks are triggered through unnecessary pop ups. • Always install updated Software patches from the Operating system venders because they contain some of these security mechanisms that protect your computer from any possible attack. • For Organization they should have a well developed IT policy to restrict access to certain untrusted sites to avoid any possible attacks. • A good relationship between the company and IT officers is step number one toward avoid ing any sorts on intended attacks • Before you are attacked, a back and recover plan is always paramount for the safety of one s data. So don’t wait to be attacked and then remember to backup • Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena ble one see potentially dangerous files • If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections such as Wi-Fi this will prevent the infection from spreading.
  • 7. How do you think victims should respond to Ransomware attacks?  Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you can realize that it was just a mare attack you find your self paying for what you didn’t commit .  Shutdown the infected machine to avoid further encryption of files.  Disconnect the affected device from the network to a further attack on the other devices on the network.  Don’t pay up any amount of money since you already know that the guys are crooks  Taking to a technician you trust for help.  Try using boot-time antivirus Sophos Antivirus.  Clean Up the infected Machine and use a data recovery software to recover your information.  For Organization follow the disaster recovery plan it could have a fast solution to avoid ma ss loss of data and down times.
  • 8. Do they have an ethical obligation to future victims? Yes they do..  A Backup plan is always necessary before any attack to avoid data loss in case there is an attack.  Using an Updated antivirus and anti malware software is necessary to detect and block any attacks .  Computer users should avoid using counterfeited software because they are used as honey ports by attacks.  Computer users should enable the display of file extensions so that they can be able to tell which files are dangerous to there computer systems as away to limit chance of being attacked  Research is necessary to keep computer users informed about the on going attacks, how to prevents and solve these attacks in case they are meet.  Internet users should always avoid responding positively to scareware for these are ways through which ransom attacks are triggered