SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
What is malware?
As software designed to interfere with a computer's
normal functioning, malware is a blanket term for
viruses, Trojans, and other destructive computer programs
threat actors use to infect systems and networks in order
to gain access to sensitive information.
How do malware infections happen?
Malware authors use a variety of physical
and virtual means to spread malware that
infects devices and networks. For example,
malicious programs can be delivered to a
system with a USB drive, through popular
collaboration tools and by drive-by
downloads, which automatically download
What Are the Most Common Types of MALWARE Attacks?
 1) Adware.
 2) Fileless Malware.
 3) Viruses.
 4) Worms.
 5) Trojans.
 6) Bots.
 7) Ransomware.
 8) Spyware.
What is Ransomware?
Ransomware is a malware designed to deny a user or organization access to
files on their computer. By encrypting these files and demanding a ransom
payment for the decryption key, cyberattackers place organizations in a
position where paying the ransom is the easiest and cheapest way to regain
access to their files. Some variants have added additional functionality – such
as data theft – to provide further incentive for ransomware victims to pay the
ransom.
How Ransomware Works?
In order to be successful, ransomware needs to gain access to a
target system, encrypt the files there, and demand a ransom from
the victim.
While the implementation details vary from one ransomware
variant to another, all share the same core three stages
 Step 1. Infection and Distribution Vectors
Ransomware, like any malware, can gain access to an organization’s systems
in a number of different ways. However, ransomware operators tend to
prefer a few specific infection vectors.
 Step 2. Data Encryption
After ransomware has gained access to a system, it can begin encrypting
its files. Since encryption functionality is built into an operating system,
this simply involves accessing files, encrypting them with an attacker-
controlled key, and replacing the originals with the encrypted versions.
Most ransomware variants are cautious in their selection of files to encrypt
to ensure system stability. Some variants will also take steps to delete
backup and shadow copies of files to make recovery without the
Popular Ransomware Variants
Dozens of ransomware variants exist, each with its own unique
characteristics. However, some ransomware groups have been
more prolific and successful than others, making them stand out
from the crowd.
1. Ryuk
2. Maze
3.REvil (Sodinokibi)
4. Lockbit
5. DearCry
Utilize Best Practices
Proper preparation can dramatically decrease the cost and impact of a
ransomware attack. Taking the following best practices can reduce an
organization’s exposure to ransomware and minimize its impacts:
Howto Protect Against Ransomware?
Cyber Awareness Training and Education: is often spread using phishing emails. Training users on
how to identify RANSOMEWARE and avoid potential ransomware attacks is crucial. As many of
the current cyber-attacks start with a targeted email that does not even contain malware,
but only a socially-engineered message that encourages the user to click on a malicious link,
user education is often considered as one of the most important defenses an organization
can DEPOYED.
Continuous data backups: Ransomware’s definition says that it is malware designed to make it
so that paying a ransom only way to restore access to the encrypted data. Automated,
protected data backups enable an organization to recover from an attack with a minimum
of data loss and without paying a ransom. Maintaining regular backups of data as a routine
process is a very important practice to prevent losing data, and to be able to recover it in
the event of corruption or disk hardware malfunction. Functional backups can also help
organizations to recover from ransomware attacks.
Patching: Patching is a critical component in defending against ransomware attacks as cyber-
criminals will often look for the latest uncovered exploits in the patches made available
and then target systems that are not yet patched. As such, it is critical that organizations
ensure that all systems have the latest patches applied to them, as this reduces the
number of potential vulnerabilities within the business for an attacker to exploit.
User Authentication: Accessing services like RDP with stolen user credentials is a favorite
technique of ransomware attackers. The use of strong user authentication can make it
harder for an attacker to make use of a guessed or stolen password.
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdf

Weitere ähnliche Inhalte

Ähnlich wie cybercrime-221128115730-fe6cd22c.pdf

Malware Detection and Prevention
Malware Detection and PreventionMalware Detection and Prevention
Malware Detection and Prevention
kamranrazzaq8
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
krunal gandhi
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
Avinash Sinha
 

Ähnlich wie cybercrime-221128115730-fe6cd22c.pdf (20)

Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
Malware Detection and Prevention
Malware Detection and PreventionMalware Detection and Prevention
Malware Detection and Prevention
 
Presentation2
Presentation2Presentation2
Presentation2
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cyber security
Cyber security Cyber security
Cyber security
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Mitppt
MitpptMitppt
Mitppt
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

cybercrime-221128115730-fe6cd22c.pdf

  • 1.
  • 2.
  • 3. What is malware? As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, Trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.
  • 4. How do malware infections happen? Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive, through popular collaboration tools and by drive-by downloads, which automatically download
  • 5. What Are the Most Common Types of MALWARE Attacks?  1) Adware.  2) Fileless Malware.  3) Viruses.  4) Worms.  5) Trojans.  6) Bots.  7) Ransomware.  8) Spyware.
  • 6. What is Ransomware? Ransomware is a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyberattackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files. Some variants have added additional functionality – such as data theft – to provide further incentive for ransomware victims to pay the ransom.
  • 7. How Ransomware Works? In order to be successful, ransomware needs to gain access to a target system, encrypt the files there, and demand a ransom from the victim. While the implementation details vary from one ransomware variant to another, all share the same core three stages  Step 1. Infection and Distribution Vectors Ransomware, like any malware, can gain access to an organization’s systems in a number of different ways. However, ransomware operators tend to prefer a few specific infection vectors.  Step 2. Data Encryption After ransomware has gained access to a system, it can begin encrypting its files. Since encryption functionality is built into an operating system, this simply involves accessing files, encrypting them with an attacker- controlled key, and replacing the originals with the encrypted versions. Most ransomware variants are cautious in their selection of files to encrypt to ensure system stability. Some variants will also take steps to delete backup and shadow copies of files to make recovery without the
  • 8. Popular Ransomware Variants Dozens of ransomware variants exist, each with its own unique characteristics. However, some ransomware groups have been more prolific and successful than others, making them stand out from the crowd. 1. Ryuk 2. Maze 3.REvil (Sodinokibi) 4. Lockbit 5. DearCry
  • 9. Utilize Best Practices Proper preparation can dramatically decrease the cost and impact of a ransomware attack. Taking the following best practices can reduce an organization’s exposure to ransomware and minimize its impacts: Howto Protect Against Ransomware? Cyber Awareness Training and Education: is often spread using phishing emails. Training users on how to identify RANSOMEWARE and avoid potential ransomware attacks is crucial. As many of the current cyber-attacks start with a targeted email that does not even contain malware, but only a socially-engineered message that encourages the user to click on a malicious link, user education is often considered as one of the most important defenses an organization can DEPOYED. Continuous data backups: Ransomware’s definition says that it is malware designed to make it so that paying a ransom only way to restore access to the encrypted data. Automated, protected data backups enable an organization to recover from an attack with a minimum of data loss and without paying a ransom. Maintaining regular backups of data as a routine process is a very important practice to prevent losing data, and to be able to recover it in the event of corruption or disk hardware malfunction. Functional backups can also help organizations to recover from ransomware attacks. Patching: Patching is a critical component in defending against ransomware attacks as cyber- criminals will often look for the latest uncovered exploits in the patches made available and then target systems that are not yet patched. As such, it is critical that organizations ensure that all systems have the latest patches applied to them, as this reduces the number of potential vulnerabilities within the business for an attacker to exploit. User Authentication: Accessing services like RDP with stolen user credentials is a favorite technique of ransomware attackers. The use of strong user authentication can make it harder for an attacker to make use of a guessed or stolen password.