SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Mumbere Joab
RANSOMWARE ATTACKS
Case study: The Reveton Ransomware Attacks
Reveton
What is a Ransomware?
Ransomware is malware for data kidnapping or an exploit in which the
attacker encrypts the victim's data and demands payment for the
decryption key.
Why are Ransomware attacks on the rise?
 Rising Number Of Unemployed I.T Geeks.
As is the case with many crimes committed outside the Internet, money is a
major motivator for many cyber criminals. Especially when the dangers of
criminality are less apparent when you're hiding behind a network, the
perception of low risk and very high financial reward prompts many cyber
criminals to engage in Ransomware attacks
 Weak Organizational policies on privacy and access of I.T Infrastructure.
This is involves granting access to unauthorized people who may end up
using that opportunity to carryout the attack if they are able to access the severs ,
network or even workstations .
 Increasing use of the internet by organizations and individuals
The Increased use the internet by organizations and individuals to store and
share sensitive information creates a favorable conditions for the attackers to lay
there traps because they know how sensitive the information is to victim and
they assured of a big pay at the end of the day while on panics to restore their
information.
 Increasing use of counterfeit software especially in developing countries.
Mostly of these commonly know as Cracks have contain malicious scripts that
can be used to set a Ransomware attack on the users as long as they are
connected on the network
Why are Ransomware attacks on the rise?
 Structurally motivated attacks
Beyond the causes that motivate the attackers, the environment in
which the attack is committed also serves to explain the prevalence of
the phenomenon. While more and more personal and sensitive
information is stored online, this increases the potential rewards for a r
ansom attack. Neither computer security nor applications like email
filters have improved dramatically in terms of coverage. According to
the anti-virus manufacturer Norton, for example, as many as 41 percen
t of computers did not have up-to-date security protection in 2012.
 Personally motivated attacks
The attackers what they do, including their crimes is often the cause of
personal emotions and vendettas. From the disgruntled employee ,
installing a malware on office computers to a jealous boyfriend
hacking into a girlfriend's social media accounts or a teenager taking
down a school website just to prove that he could do it, many cyber
crimes are essentially crimes of passion committed over the Internet.
Many of these crimes, however, can still have very serious impacts and
cause considerable property damage.
What can you do to prevent Ransomware
attacks on your own computer?
‱ Make sure Your antivirus is updated with a real time protection mechanism and internet
Security plans .
‱ Always block Pop Ups from your web browsers since most of there attacks are triggered
through unnecessary pop ups.
‱ Always install updated Software patches from the Operating system venders because they
contain some of these security mechanisms that protect your computer from any possible
attack.
‱ For Organization they should have a well developed IT policy to restrict access to certain
untrusted sites to avoid any possible attacks.
‱ A good relationship between the company and IT officers is step number one toward avoid
ing any sorts on intended attacks
‱ Before you are attacked, a back and recover plan is always paramount for the safety of one
s data. So don’t wait to be attacked and then remember to backup
‱ Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena
ble one see potentially dangerous files
‱ If you discover a rogue or unknown process on your machine, disconnect it immediately
from the internet or other network connections such as Wi-Fi this will prevent the infection
from spreading.
How do you think victims should
respond to Ransomware attacks?
 Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you
can realize that it was just a mare attack you find your self paying for what you didn’t
commit .
 Shutdown the infected machine to avoid further encryption of files.
 Disconnect the affected device from the network to a further attack on the other devices
on the network.
 Don’t pay up any amount of money since you already know that the guys are crooks
 Taking to a technician you trust for help.
 Try using boot-time antivirus Sophos Antivirus.
 Clean Up the infected Machine and use a data recovery software to recover your
information.
 For Organization follow the disaster recovery plan it could have a fast solution to avoid ma
ss loss of data and down times.
Do they have an ethical obligation
to future victims?
Yes they do..
 A Backup plan is always necessary before any attack to avoid data loss in case there is an
attack.
 Using an Updated antivirus and anti malware software is necessary to detect and block any
attacks .
 Computer users should avoid using counterfeited software because they are used as honey
ports by attacks.
 Computer users should enable the display of file extensions so that they can be able to tell
which files are dangerous to there computer systems as away to limit chance of being
attacked
 Research is necessary to keep computer users informed about the on going attacks, how
to prevents and solve these attacks in case they are meet.
 Internet users should always avoid responding positively to scareware for these are ways
through which ransom attacks are triggered
Ransomware attacks reveton

Weitere Àhnliche Inhalte

Was ist angesagt?

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackersSantosh Kumar
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Ransomware
RansomwareRansomware
RansomwareNick Miller
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
cyber security
cyber securitycyber security
cyber securityabithajayavel
 
Ransomware
Ransomware Ransomware
Ransomware Armor
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security pptCH Asim Zubair
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 

Was ist angesagt? (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber security
Cyber securityCyber security
Cyber security
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Ransomware
RansomwareRansomware
Ransomware
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Network Security
Network Security Network Security
Network Security
 
cyber security
cyber securitycyber security
cyber security
 
Ransomware
Ransomware Ransomware
Ransomware
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 

Ähnlich wie Ransomware attacks reveton

Malware Infections
Malware InfectionsMalware Infections
Malware InfectionsJessica Howard
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxTier3MD
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices EyesOpen Association
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?Milan Santana
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 

Ähnlich wie Ransomware attacks reveton (20)

Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Synchronized security
Synchronized securitySynchronized security
Synchronized security
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 

KĂŒrzlich hochgeladen

call girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžDelhi Call girls
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
CALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfWilly Marroquin (WillyDevNET)
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

KĂŒrzlich hochgeladen (20)

call girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Vaishali (Ghaziabad) 🔝 >àŒ’8448380779 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Vip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS Live
Vip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS LiveVip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS Live
Vip Call Girls Noida âžĄïž Delhi âžĄïž 9999965857 No Advance 24HRS Live
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➄8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Ransomware attacks reveton

  • 1. Mumbere Joab RANSOMWARE ATTACKS Case study: The Reveton Ransomware Attacks
  • 3. What is a Ransomware? Ransomware is malware for data kidnapping or an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key.
  • 4. Why are Ransomware attacks on the rise?  Rising Number Of Unemployed I.T Geeks. As is the case with many crimes committed outside the Internet, money is a major motivator for many cyber criminals. Especially when the dangers of criminality are less apparent when you're hiding behind a network, the perception of low risk and very high financial reward prompts many cyber criminals to engage in Ransomware attacks  Weak Organizational policies on privacy and access of I.T Infrastructure. This is involves granting access to unauthorized people who may end up using that opportunity to carryout the attack if they are able to access the severs , network or even workstations .  Increasing use of the internet by organizations and individuals The Increased use the internet by organizations and individuals to store and share sensitive information creates a favorable conditions for the attackers to lay there traps because they know how sensitive the information is to victim and they assured of a big pay at the end of the day while on panics to restore their information.  Increasing use of counterfeit software especially in developing countries. Mostly of these commonly know as Cracks have contain malicious scripts that can be used to set a Ransomware attack on the users as long as they are connected on the network
  • 5. Why are Ransomware attacks on the rise?  Structurally motivated attacks Beyond the causes that motivate the attackers, the environment in which the attack is committed also serves to explain the prevalence of the phenomenon. While more and more personal and sensitive information is stored online, this increases the potential rewards for a r ansom attack. Neither computer security nor applications like email filters have improved dramatically in terms of coverage. According to the anti-virus manufacturer Norton, for example, as many as 41 percen t of computers did not have up-to-date security protection in 2012.  Personally motivated attacks The attackers what they do, including their crimes is often the cause of personal emotions and vendettas. From the disgruntled employee , installing a malware on office computers to a jealous boyfriend hacking into a girlfriend's social media accounts or a teenager taking down a school website just to prove that he could do it, many cyber crimes are essentially crimes of passion committed over the Internet. Many of these crimes, however, can still have very serious impacts and cause considerable property damage.
  • 6. What can you do to prevent Ransomware attacks on your own computer? ‱ Make sure Your antivirus is updated with a real time protection mechanism and internet Security plans . ‱ Always block Pop Ups from your web browsers since most of there attacks are triggered through unnecessary pop ups. ‱ Always install updated Software patches from the Operating system venders because they contain some of these security mechanisms that protect your computer from any possible attack. ‱ For Organization they should have a well developed IT policy to restrict access to certain untrusted sites to avoid any possible attacks. ‱ A good relationship between the company and IT officers is step number one toward avoid ing any sorts on intended attacks ‱ Before you are attacked, a back and recover plan is always paramount for the safety of one s data. So don’t wait to be attacked and then remember to backup ‱ Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena ble one see potentially dangerous files ‱ If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections such as Wi-Fi this will prevent the infection from spreading.
  • 7. How do you think victims should respond to Ransomware attacks?  Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you can realize that it was just a mare attack you find your self paying for what you didn’t commit .  Shutdown the infected machine to avoid further encryption of files.  Disconnect the affected device from the network to a further attack on the other devices on the network.  Don’t pay up any amount of money since you already know that the guys are crooks  Taking to a technician you trust for help.  Try using boot-time antivirus Sophos Antivirus.  Clean Up the infected Machine and use a data recovery software to recover your information.  For Organization follow the disaster recovery plan it could have a fast solution to avoid ma ss loss of data and down times.
  • 8. Do they have an ethical obligation to future victims? Yes they do..  A Backup plan is always necessary before any attack to avoid data loss in case there is an attack.  Using an Updated antivirus and anti malware software is necessary to detect and block any attacks .  Computer users should avoid using counterfeited software because they are used as honey ports by attacks.  Computer users should enable the display of file extensions so that they can be able to tell which files are dangerous to there computer systems as away to limit chance of being attacked  Research is necessary to keep computer users informed about the on going attacks, how to prevents and solve these attacks in case they are meet.  Internet users should always avoid responding positively to scareware for these are ways through which ransom attacks are triggered