SlideShare a Scribd company logo
1 of 31
Col Inderjit Singh
Chief Information Officer
Khemist.in
@inderbarara
@inderbarara
Ransomware
Emergence of the Cyber-Extortion Menace
A little bit of History
2008
AIDS Trojan Gpcode 12-2012 02-2014 05-2014 5-2015 -
1989 (1024 Something Cryptode Cryptowall 10-2014 Included
(symmetric) bit) (targeted) fense Oz Post in Kits
2006 09-2012 09-2013 04-2014 06-2014 1-2015 โ€“
Cryzip, Gpcode Reveton Cryptolocker Crytodefense CTB-Locker Crypto
Wall V3
(660 Bit),Others (Lock Only) Variant
Ransomware: Escalating Extortion
Insight Into
Ransomware Campaign
Ransomware
โ€ข A type of malware that restricts access to the infected computer system in someway and
Demands that the user pay a ransom to the malware operators to remove the restriction.
โ€ข Some of the Malicious actions by Malware:
๏ƒผ Encrypt personal files ( images, movie files, documents, text files)
๏ƒผ Encrypt files on shared network drives/ resources
๏ƒผ Lock system access using login
๏ƒผ Crash system through resource use โ€“ eg spawning processes
๏ƒผ Disrupt and annoy โ€“ open browser windows, display pornographic images
Stages of Ransomware
โ€ข Step 1: Targeting โ€“ OS, Geography, banking/ e-Commerce, Consumer
โ€ข Step 2: Propagation โ€“phishing, drive-by-download, attachments
โ€ข Step 3: Exploit - exploit kits, vulnerability-based, unpatched systems
โ€ข Step 4 : Infection โ€“ payload delivery, backdoor access
โ€ข Step 5: Execution โ€“ encryption, disruption, blocked access, Ransom
Office files PDF files Database files
Images & Drawings Games files
Targeted Files
How Ransomware Works?
Step 1 Step 2
Ransom Evolves: Learning New Tricks
Using TOR Network
to Hide C&C
Bitcoin is default
payment method
Mobile and Cloud based
ransomware
Increasingly difficult to detect
and shutdown ransomware
Harder for Law
enforcement to trace
Near impossible to
decrypt
without paying
Onion Routing (ToR)
โ€ข By Paul Syverson, Nick Mathewson,
Roger Dingledine in 2004
โ€ข Low-latency anonymous network
โ€ข Maintained by Free Haven Project
โ€ข Hundreds of nodes on all continents
โ€ข Supports only TCP
โ€ข Uses SOCKS interface
โ€ข Continuously encrypt data across a network.
โ€ข Data begins in the outermost layer of
encryption and is modified at each individual
stop.
How Tor Works? - Onion Routing
โ€ข A circuit is built incrementally one hop by one hop
โ€ข Onion-like encryption
โ€ข โ€˜Aliceโ€™ negotiates an AES key with each router
โ€ข Messages are divided into equal sized cells
โ€ข Each router knows only its predecessor and successor
โ€ข Only the Exit Router (OR3) can see the message, however it does
not know where the message is from
Alice Bob
OR2
OR
1
M
โˆšM
M
OR3
M
C1 C2
C2 C3
C3 Port
Ransomware: Operation with ToR
Step6
Step 2
โ€ข Uses Diffie-Hellman key
exchange
โ€ข Distributes data over
several places
โ€ข Takes random pathway
โ€ข Used with Privoxy
Ransom Evolves: Learning New Tricks
Using TOR Network
to Hide C&C
Bitcoin is default
payment method
Mobile and Cloud based
Ransomware
Increasingly difficult to detect
and shutdown ransomware
Harder for Law
enforcement to trace
Near impossible to
decrypt
without paying
What is Bitcoin
Bitcoin is an digital currency introduced in 2008 by pseudonymous developer
"Satoshi Nakamoto". That can be exchanged for goods and services
Digital: Bitcoins cannot be printed or physically made.
They must be generated through computerized methods.
Decentralized: Bitcoins are not regulated by any government
or banking institution.
Revolutionary: Transactions allow for anonymity and are almost
instantaneous.
Global: Bitcoins are borderless currency and can be used
anywhere.
Bitcoin Wallet
โ€ข Bitcoins are stored in your digital wallet.
โ€ข When you transfer Bitcoins an electronic signature is added. After a few minutes the
transaction is verified stored in the network
CryptoLocker and
CryptoWall
CryptoLocker
โ–ช Email attachment is the main method of infection
โ–ช Targets all versions of Windows
โ–ช Searches for files with certain extensions: doc, docx, wps, xls, xlsx, ppt,
pptx, mdb, pst, rtf, pdf, eps, jpg, dng, psd, raw, cer, crt, pfx, โ€ฆ
โ–ช Encrypts files with a 2048-bit RSA key pair
โ–ช Paying the ransom results in decryption of the files
โ–ช No way to decrypt the files without the private key
โ–ช Ransomware done right!
CryptoLocker Details
| 18 |
Some email subject lines related to CryptoLocker:
โ–ช USPS - Missed package delivery
โ–ช FW: Invoice <random numbers>
โ–ช ADP Reference #<random numbers>
โ–ช Payroll Received by Intuit
โ–ช Important - attachedform
โ–ช FW: Last Month Remit
โ–ช Scanned Image from a Xerox WorkCentre
โ–ช Fwd: IMG01041_6706015_m.zip
โ–ช My resume
โ–ช Voice Message from Unknown Caller (<phone number>)
โ–ช Important - New Outlook Settings
โ–ช FW: Payment Advice - Advice Ref:[GB<randomnumbers>]
โ–ช New contract agreement
โ–ช Important Notice - Incoming Money Transfer
โ–ช Payment Overdue - Please respond
โ–ช FW: Check copy
โ–ช Corporate eFax message from <phone number>
โ–ช FW: Case FH74D23GST58NQS
Most of the subject lines
target SMBs who might
not have recent backups
and who might need their
files bad enough to pay
Method of Execution
โ€ข Drops executable in users %AppData% and %LocalAppData%
folder
โ€ข Create registry keys to maintain persistence
โ€ข Search for specific file types
โ€ข Performs encryption
โ€ข Deletes Volume Shadow copies
โ€ข Displays ransom note
CryptoLocker Analysis
- Drops copy of itself in %APPDATA%{random}.exe
- It creates the following autorun key.
HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun "CryptoLocker":<random>.exe
- It creates two processes of itself. The other acts as a watchdog.
Later versions of CryptoLocker create an additional registry entry:
HKCUSOFTWAREMicrosoftWindowsCurrentVersionRunOnce "*CryptoLocker":<random>.exe
Cryptolocker Analysis
โ€ข It searches in all local and remote drives for files to encrypt.
โ€ข All files that are encrypted are also saved in the following registry for record:
HKEY_CURRENT_USERSoftwareCryptoLockerFiles
The only way to decrypt is to buy the private key from the attackers
CryptoLocker C&C
โ€ข Domain Generation Algorithm
It uses any of the following TLD for every generated domain:
.com , .net , .biz, .ru , .org , .co.uk , .info
1 2
3
4
โ€ข Encrypt Files with the public key flow
5
6
CryptoLocker Victims
Filename and Extensions Encrypted by CryptoLocker
CryptoLocker Details
Paying ~$300
will get you the
private key
Payment Screen
Payment Methods
Validating Payment Method
CryptoLocker Ransom
Payment options
moneypak, ukash, cashu, bitcoin
Price: $300 USD or 2 BTC
Cryptolocker 2.0
Original Cryptolocker Cryptolocker 2.0
Compiler C++ .NET
Encryption RSA-2048 RSA-4096
C&C servers Employs DGA No DGA
Payment Scheme moneypak, ucash, cashu,
bitcoin
bitcoin only
Around December 2013, a new ransomware emerged claiming to be
Cryptolocker 2.0.
Drops copy of itself in %system%. As msunet.exe
Preventive Tips?
โ€œStrong collaboration between private industries
first and with Global Law Enforcementโ€
Predictions for 2016
โ€ข Ransomware will continue to be a challenge in 2016
โ€ข Encrypting Ransomware samples will also have data theft capability
โ€ข Targeting Android and iOS platforms
โ€ข They are expected to get highly targeted in nature
โ€ข They will use extortion tactics with threats to make stolen data public
โ€ข It is highly advised to implement backup policies and processes with high-
end encryption
Security Software โ€“ Ensure the personal firewall and anti-malware software is working properly and
up-to-date
Patch Management โ€“ Update all applications with the latest security patches
Least Privilege Access โ€“ Do not use the administrator account for everyday use or while surfing the
Internet
Computer Hardening โ€“ Configure the operating system, browser, wireless AP, and router to make it
more secure
Online Security โ€“ Choose strong, unique passphrases for online accounts and enter them securely
Content Filtering โ€“ Use web, email, and IM filtering as well as a link checker to block unwanted and
malicious content
Asset Protection โ€“ Encrypt and regularly backup your important documents and files
How to Protect Your Computer
Follow Best Security Practices
โ€ข Do not open and execute attachments received from unknown
senders. Cybercriminals use โ€˜Social Engineeringโ€™ techniques to allure
users to open attachments or to click on links containing malware.
โ€ข Keep strong passwords for login accounts and network shares.
โ€ข Avoid downloading software from untrusted P2P or torrent sites. At
times, they are Trojanized with malicious software.
โ€ข Do not download cracked software as they could propagate the
added risk of opening a backdoor entry for malware into your
system.
โ€ข Ensure staff are educated in good computing practices
Thanx

More Related Content

What's hot

WHITE PAPERโ–ถ The Evolution of Ransomware
WHITE PAPERโ–ถ The Evolution of RansomwareWHITE PAPERโ–ถ The Evolution of Ransomware
WHITE PAPERโ–ถ The Evolution of RansomwareSymantec
ย 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
ย 
Ransomware
Ransomware Ransomware
Ransomware Armor
ย 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
ย 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideSarah Roberts
ย 
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...Roger Hagedorn
ย 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
ย 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessCalyptix Security
ย 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attackdoiss delhi
ย 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
ย 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...ClearDATACloud
ย 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
ย 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceZubair Baig
ย 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
ย 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachGowling WLG
ย 
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareBlackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareJohn Bambenek
ย 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
ย 

What's hot (20)

WHITE PAPERโ–ถ The Evolution of Ransomware
WHITE PAPERโ–ถ The Evolution of RansomwareWHITE PAPERโ–ถ The Evolution of Ransomware
WHITE PAPERโ–ถ The Evolution of Ransomware
ย 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
ย 
Ransomware
Ransomware Ransomware
Ransomware
ย 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
ย 
Ransomware
RansomwareRansomware
Ransomware
ย 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
ย 
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...
ย 
Ransomware
RansomwareRansomware
Ransomware
ย 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
ย 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT business
ย 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
ย 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
ย 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
ย 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
ย 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
ย 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
ย 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breach
ย 
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareBlackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
ย 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
ย 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
ย 

Similar to Ransomware- What you need to know to Safeguard your Data

Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
ย 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016Earl Carter
ย 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
ย 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptxmalikmuzammil2326
ย 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis MPhil/MRes/BSc
ย 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
ย 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the CloudTeri Radichel
ย 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICThe Linux Foundation
ย 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux SecurityRizky Ariestiyansyah
ย 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEric Vanderburg
ย 
Malware and Modern Propagation Techniques
Malware and Modern Propagation TechniquesMalware and Modern Propagation Techniques
Malware and Modern Propagation TechniquesJoseph Bugeja
ย 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeekNightHyderabad
ย 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
ย 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...Eric Vanderburg
ย 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentationisc2-hellenic
ย 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
ย 

Similar to Ransomware- What you need to know to Safeguard your Data (20)

Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
ย 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
ย 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
ย 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
ย 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
ย 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
ย 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
ย 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
ย 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
ย 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
ย 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
ย 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
ย 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
ย 
Malware and Modern Propagation Techniques
Malware and Modern Propagation TechniquesMalware and Modern Propagation Techniques
Malware and Modern Propagation Techniques
ย 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
ย 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
ย 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
ย 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
ย 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
ย 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
ย 

More from Inderjeet Singh

Perils of social media
Perils of social mediaPerils of social media
Perils of social mediaInderjeet Singh
ย 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
ย 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisInderjeet Singh
ย 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singhInderjeet Singh
ย 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesInderjeet Singh
ย 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
ย 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile ConvergenceInderjeet Singh
ย 

More from Inderjeet Singh (7)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
ย 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
ย 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
ย 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
ย 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
ย 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
ย 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
ย 

Recently uploaded

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
ย 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLimonikaupta
ย 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceDelhi Call girls
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Delhi Call girls
ย 

Recently uploaded (20)

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 

Ransomware- What you need to know to Safeguard your Data

  • 1. Col Inderjit Singh Chief Information Officer Khemist.in @inderbarara @inderbarara Ransomware Emergence of the Cyber-Extortion Menace
  • 2. A little bit of History 2008 AIDS Trojan Gpcode 12-2012 02-2014 05-2014 5-2015 - 1989 (1024 Something Cryptode Cryptowall 10-2014 Included (symmetric) bit) (targeted) fense Oz Post in Kits 2006 09-2012 09-2013 04-2014 06-2014 1-2015 โ€“ Cryzip, Gpcode Reveton Cryptolocker Crytodefense CTB-Locker Crypto Wall V3 (660 Bit),Others (Lock Only) Variant
  • 5. Ransomware โ€ข A type of malware that restricts access to the infected computer system in someway and Demands that the user pay a ransom to the malware operators to remove the restriction. โ€ข Some of the Malicious actions by Malware: ๏ƒผ Encrypt personal files ( images, movie files, documents, text files) ๏ƒผ Encrypt files on shared network drives/ resources ๏ƒผ Lock system access using login ๏ƒผ Crash system through resource use โ€“ eg spawning processes ๏ƒผ Disrupt and annoy โ€“ open browser windows, display pornographic images
  • 6. Stages of Ransomware โ€ข Step 1: Targeting โ€“ OS, Geography, banking/ e-Commerce, Consumer โ€ข Step 2: Propagation โ€“phishing, drive-by-download, attachments โ€ข Step 3: Exploit - exploit kits, vulnerability-based, unpatched systems โ€ข Step 4 : Infection โ€“ payload delivery, backdoor access โ€ข Step 5: Execution โ€“ encryption, disruption, blocked access, Ransom
  • 7. Office files PDF files Database files Images & Drawings Games files Targeted Files
  • 9. Ransom Evolves: Learning New Tricks Using TOR Network to Hide C&C Bitcoin is default payment method Mobile and Cloud based ransomware Increasingly difficult to detect and shutdown ransomware Harder for Law enforcement to trace Near impossible to decrypt without paying
  • 10. Onion Routing (ToR) โ€ข By Paul Syverson, Nick Mathewson, Roger Dingledine in 2004 โ€ข Low-latency anonymous network โ€ข Maintained by Free Haven Project โ€ข Hundreds of nodes on all continents โ€ข Supports only TCP โ€ข Uses SOCKS interface โ€ข Continuously encrypt data across a network. โ€ข Data begins in the outermost layer of encryption and is modified at each individual stop.
  • 11. How Tor Works? - Onion Routing โ€ข A circuit is built incrementally one hop by one hop โ€ข Onion-like encryption โ€ข โ€˜Aliceโ€™ negotiates an AES key with each router โ€ข Messages are divided into equal sized cells โ€ข Each router knows only its predecessor and successor โ€ข Only the Exit Router (OR3) can see the message, however it does not know where the message is from Alice Bob OR2 OR 1 M โˆšM M OR3 M C1 C2 C2 C3 C3 Port
  • 12. Ransomware: Operation with ToR Step6 Step 2 โ€ข Uses Diffie-Hellman key exchange โ€ข Distributes data over several places โ€ข Takes random pathway โ€ข Used with Privoxy
  • 13. Ransom Evolves: Learning New Tricks Using TOR Network to Hide C&C Bitcoin is default payment method Mobile and Cloud based Ransomware Increasingly difficult to detect and shutdown ransomware Harder for Law enforcement to trace Near impossible to decrypt without paying
  • 14. What is Bitcoin Bitcoin is an digital currency introduced in 2008 by pseudonymous developer "Satoshi Nakamoto". That can be exchanged for goods and services Digital: Bitcoins cannot be printed or physically made. They must be generated through computerized methods. Decentralized: Bitcoins are not regulated by any government or banking institution. Revolutionary: Transactions allow for anonymity and are almost instantaneous. Global: Bitcoins are borderless currency and can be used anywhere.
  • 15. Bitcoin Wallet โ€ข Bitcoins are stored in your digital wallet. โ€ข When you transfer Bitcoins an electronic signature is added. After a few minutes the transaction is verified stored in the network
  • 17. CryptoLocker โ–ช Email attachment is the main method of infection โ–ช Targets all versions of Windows โ–ช Searches for files with certain extensions: doc, docx, wps, xls, xlsx, ppt, pptx, mdb, pst, rtf, pdf, eps, jpg, dng, psd, raw, cer, crt, pfx, โ€ฆ โ–ช Encrypts files with a 2048-bit RSA key pair โ–ช Paying the ransom results in decryption of the files โ–ช No way to decrypt the files without the private key โ–ช Ransomware done right!
  • 18. CryptoLocker Details | 18 | Some email subject lines related to CryptoLocker: โ–ช USPS - Missed package delivery โ–ช FW: Invoice <random numbers> โ–ช ADP Reference #<random numbers> โ–ช Payroll Received by Intuit โ–ช Important - attachedform โ–ช FW: Last Month Remit โ–ช Scanned Image from a Xerox WorkCentre โ–ช Fwd: IMG01041_6706015_m.zip โ–ช My resume โ–ช Voice Message from Unknown Caller (<phone number>) โ–ช Important - New Outlook Settings โ–ช FW: Payment Advice - Advice Ref:[GB<randomnumbers>] โ–ช New contract agreement โ–ช Important Notice - Incoming Money Transfer โ–ช Payment Overdue - Please respond โ–ช FW: Check copy โ–ช Corporate eFax message from <phone number> โ–ช FW: Case FH74D23GST58NQS Most of the subject lines target SMBs who might not have recent backups and who might need their files bad enough to pay
  • 19. Method of Execution โ€ข Drops executable in users %AppData% and %LocalAppData% folder โ€ข Create registry keys to maintain persistence โ€ข Search for specific file types โ€ข Performs encryption โ€ข Deletes Volume Shadow copies โ€ข Displays ransom note
  • 20. CryptoLocker Analysis - Drops copy of itself in %APPDATA%{random}.exe - It creates the following autorun key. HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun "CryptoLocker":<random>.exe - It creates two processes of itself. The other acts as a watchdog. Later versions of CryptoLocker create an additional registry entry: HKCUSOFTWAREMicrosoftWindowsCurrentVersionRunOnce "*CryptoLocker":<random>.exe
  • 21. Cryptolocker Analysis โ€ข It searches in all local and remote drives for files to encrypt. โ€ข All files that are encrypted are also saved in the following registry for record: HKEY_CURRENT_USERSoftwareCryptoLockerFiles The only way to decrypt is to buy the private key from the attackers
  • 22. CryptoLocker C&C โ€ข Domain Generation Algorithm It uses any of the following TLD for every generated domain: .com , .net , .biz, .ru , .org , .co.uk , .info 1 2 3 4 โ€ข Encrypt Files with the public key flow 5 6
  • 23. CryptoLocker Victims Filename and Extensions Encrypted by CryptoLocker
  • 24. CryptoLocker Details Paying ~$300 will get you the private key Payment Screen Payment Methods Validating Payment Method
  • 25. CryptoLocker Ransom Payment options moneypak, ukash, cashu, bitcoin Price: $300 USD or 2 BTC
  • 26. Cryptolocker 2.0 Original Cryptolocker Cryptolocker 2.0 Compiler C++ .NET Encryption RSA-2048 RSA-4096 C&C servers Employs DGA No DGA Payment Scheme moneypak, ucash, cashu, bitcoin bitcoin only Around December 2013, a new ransomware emerged claiming to be Cryptolocker 2.0. Drops copy of itself in %system%. As msunet.exe
  • 27. Preventive Tips? โ€œStrong collaboration between private industries first and with Global Law Enforcementโ€
  • 28. Predictions for 2016 โ€ข Ransomware will continue to be a challenge in 2016 โ€ข Encrypting Ransomware samples will also have data theft capability โ€ข Targeting Android and iOS platforms โ€ข They are expected to get highly targeted in nature โ€ข They will use extortion tactics with threats to make stolen data public โ€ข It is highly advised to implement backup policies and processes with high- end encryption
  • 29. Security Software โ€“ Ensure the personal firewall and anti-malware software is working properly and up-to-date Patch Management โ€“ Update all applications with the latest security patches Least Privilege Access โ€“ Do not use the administrator account for everyday use or while surfing the Internet Computer Hardening โ€“ Configure the operating system, browser, wireless AP, and router to make it more secure Online Security โ€“ Choose strong, unique passphrases for online accounts and enter them securely Content Filtering โ€“ Use web, email, and IM filtering as well as a link checker to block unwanted and malicious content Asset Protection โ€“ Encrypt and regularly backup your important documents and files How to Protect Your Computer
  • 30. Follow Best Security Practices โ€ข Do not open and execute attachments received from unknown senders. Cybercriminals use โ€˜Social Engineeringโ€™ techniques to allure users to open attachments or to click on links containing malware. โ€ข Keep strong passwords for login accounts and network shares. โ€ข Avoid downloading software from untrusted P2P or torrent sites. At times, they are Trojanized with malicious software. โ€ข Do not download cracked software as they could propagate the added risk of opening a backdoor entry for malware into your system. โ€ข Ensure staff are educated in good computing practices
  • 31. Thanx