Ransomware is a type of malicious software that blocks access to data or threatens to publish it until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them and ransomware attacks 2017
2. Ransomware has been a growing trend for the past two years,
and this is just a culmination, a grand reveal to the wider world of
just how big of a threat it is. But we’ve been writing about this for
a while now.
For More Visit Https://WWW.ThesisScientist.com
3. There are 2 Types of Ransomware in
Circulation:
1. Encryptors, which incorporates advanced encryption
algorithms. It’s designed to block system files and demand payment
to provide the victim with the key that can decrypt the blocked
content
For More Visit Https://WWW.ThesisScientist.com
4. Examples: Crypto Locker, Locky,
CrytpoWall and more.
For More Visit Https://WWW.ThesisScientist.com
5. 2. Some locker versions infect the Master Boot Record (MBR). The MBR is
the section of a PC’s hard drive which enables the operating system to boot
up. When MBR ransomware strikes, the boot process can’t complete as usual
and prompts a ransom note to be displayed on the screen.
Examples include Satana and Petya
6. Why Ransomware creators and
distributors target businesses:
For More Visit Https://WWW.ThesisScientist.com
7. • Because that’s where the money is;
• Because attackers know that a successful infection can
cause major business disruptions, which will increase
their chances of getting paid;
• Because computer systems in companies are often
complex and prone to vulnerabilities that can be exploited
through technical means;
For More Visit Https://WWW.ThesisScientist.com
8. • Because the human factor is still a huge liability which can
also be exploited, but through social engineering tactics;
• Because ransomware can affect not only computers but
also servers and cloud-based file-sharing systems, going
deep into a business’s core;
• Because cyber criminals know that business would rather
not report an infection for fear or legal consequences and
brand damage.
9.
10.
11.
12. Most Common infection methods used by
Cybercriminals
• Spam email campaigns that contain malicious links or
attachments (there are plenty of forms that malware can use
for disguise on the web);
• Security exploits in vulnerable software;
• Internet traffic redirects to malicious websites;
• Legitimate websites that have malicious codeinjected in their
web pages;
• Drive-by downloads
13. • Malvertising campaigns;
• SMS messages (when targeting mobile devices);
• Botnets;
• Self-propagation (spreading from one infected computer to
another); WannaCry, for instance, used an exploit kit that
scanned a user’s PC, looking for a certain vulnerability, and
then launched a ransomware attack that targeted it.
• Affiliate schemes in ransomware-as-a-service. Basically, the
developer behind the ransomware earns a cut of the profits
each time a user pays the ransom
14. For Read Full Presentation Please Visit
Https://www.ThesisScientist.com