Abstract-- Malware or malicious software are exist everywhere, internet or locally. This paper present a category of malware which cybercriminals (hackers, crackers, etc.) currently using for monetizing around the world via internet. Ransomware is the name of this category of malware and it has a variety of families inside it. There are two famous basic types crypto ransomware and locker ransomware. Crypto ransomware usually encrypt personal files of the victims with different cryptography algorithms according how crypto ransomware is designed. These cryptographic alogorithm might be symmetric (single key) or asymmetric (double key, public key). The second type of ransomware lock the victim device (personal computer, mobile device, etc) and prevent the user from accessing it. The countermeasures how to keep secure and safe our systems or network against this dangerous type of malware will be discuss also.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Basic introduction and countermeasures to ransomware threats presentation
1. 1/20
Contents:
Basic Introduction and Countermeasures to
Ransomware Threats
Darwish Ahmad Herati1
, A.M.Bojamma2
, Dr.M.P. Indira Gandhi3
[1]. Department of Computer Science, St. Joseph’s College Bangalore
[2]. Assistant Professor, Department of Computer Science, St. Joseph’s College &
Research Scholar. Mother Teresa Women’s University
[3]. Assistant Professor, Department of Computer Science, Mother Teresa
Women’s University.
February 17, 2017
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
3. 3/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Malware (Malicious Software)
Malware ANY program or file that is harmful to a computer
(mobile devices, etc.) user is called Malware or malicious
software. That includes viruses, worms, Trojan horses,
Spyware etc.
Ransomware!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
4. 4/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Diagram:
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
5. 5/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Statistics:Countries by Percentage
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
6. 6/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Statistics: By types of Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
7. 7/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Types of Ransomware:
1- Crypto-Ransomware: (Data Locker) Prevent access
to personal files, Encrypting Symmetric, Asymmetric
2- Locker-Ransomware: (Computer Locker) Denies
access to computer/mobile device/system.
Operating Systems:
Microsoft: Windows Client/Server Versions
Linux: Linux Client/Server Distributions/Versions
OS X: OS X Client/Server Versions
Android/iOS: for handhold devices (Phones, Tablets, TVs etc.)
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
8. 8/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Targets of Ransomware
General/ Home Users
Businesses, Companies and Organizations
Public agencies and Government
Systems Affected by Ransomware :
Personal Computers
Mobile Devices
Servers
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
9. 9/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
10. 10/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
11. 11/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Locker-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
12. 12/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Google Drive
Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
13. 13/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
How you get infected:
Propagation Ways:
Traffic Distribution System (TDS)
Malvertisement (Malware Advertisement)
Spam Email
Downloaders
Social Engineering and Self-propagation
Affiliate Scheme of Spreading
Other Ways you know...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
14. 14/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Victim Manipulation Techniques:
Economics: Amount of money, type...
Psychology: Time limit, Demo of decrypting...
Social Engineering: Spreading Techniques, Spam...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
15. 15/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Countermeasures and Prevention:
Educate Staff and Inform
Update the System and Patching Software
Use a layered defense approach
Endpoint Security solution
Advise for mobile/tablet device users
Use Network Protection
Make Backups and have a Disciplined Plan
Worst State: tools to remove, Shadow copies, No
Bulletproof solution
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
16. 16/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Suggested Solution:
Use Automatic Snapshot (State Saver) Technology:
Hardware-Based and Software Based
Hardware-Based: for companies and enterprise
industries, Government etc.
Software-Based: for Home users and personal
Computers etc.
Demo!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
17. 17/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Conclusion
Problem Statement:
Malwrare: Ransomware: Cryto,Locker
Operating Systems: Microsoft, Linux, OS X, Android...
Targets and Propagation
Home Users, Businesses, Public Agencies, Government etc.
System Affected: PCs, Mobile Devices, Servers
Countermeasures and Prevention Solution
Educate Staff, Update Systems, Layered/Endpoint Security,
Backups
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
18. 18/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Further Research:
Malware Analysis and Reverse Engineering of
Ransomware in depth...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
19. 19/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
References
Hunter Hoffmann, Karthikeyan Ramasamy. (October 26,
2016). Beazley project ransomware attack to quadruple in
2016.
McAfee Lab, (2009). Ransomware-Petya. McAfee Labs
Threat Advisory: April 11, 2016.
Kevin Savage, Peter Coogan and Hon Lau . (2015).The
Evolution of Ransomware. August 6, 2015
etc...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
20. 20/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Thank You For Your
Attention
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats