SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Contents
• What is Cyber Extortion
• Definition of Ransomware
• History
• Types of Ransomware
• Famous Ransomwares
• How it works?
• How to avoid Ransomware
• Removal of malwares from PC
• TOX
• Conclusion
• References
CYBER EXTORTION
• Cyber extortion is an online crime involving an
attack or threat of attack against an
enterprise, coupled with a demand for money
to stop the attack.
• Cyber extortions have taken on multiple forms
- encrypting data and holding it hostage,
stealing data and threatening exposure, and
denying access to data.
Continue…
CYBER EXTORTION
RANSOMWARE DOS ATTACK
RANSOMWARE
–
YOUR MONEY OR YOUR DATA
RANSOMWARE DEFINED…
 Malware locks out the user’s system and demands
ransom.
 Creates “Zombie Computer” operated remotely.
 Individuals and business targeted.
 This form of extortion works on the assumption that
the data is important enough to the user that they are
willing to pay for recovery.
 There is however no guarantee of actual recovery, even
after payment is made.
HISTORY
The first known ransomware was the 1989
"AIDS" trojan (also known as "PC Cyborg")
written by Joseph Popp.
TYPES OF RANSOMWARE
 Encryption Ransomware - Locker Virus and
Onion Ransomware
 Locker Ransomware - Reveton
FAMOUS RANSOMWARE
 Reveton
 CryptoLocker
Reveton
 In 2012, a major ransomware worm known as Reveton
began to spread.
 It is also known as "police trojan".
 Its payload displays a warning from a law enforcement
agency.
 Claiming that the computer had been used for illegal
activities, such as downloading pirated software, promoting
terrorism, copyright etc.
 The warning informs the user that to unlock their system
they would have to pay a fine.
 To increase the illusion that the computer is being tracked
by law enforcement, the screen also displays the
computer's IP address and footage from a computer's
webcam.
CryptoLocker
 A Encrypting ransomware reappeared in 2013.
 Distributed either as an attachment to a malicious e-mail.
 Cryptolocker was also propagated using the Gameover
ZeuS.
 Encrypts certain types of files stored on local drives using
RSA public-key cryptography.
 The private key stored only on the malware's control
servers.
 Offers to decrypt the data if a payment is made by a
stated deadline.
 Threatens to delete the private key if the deadline passes.
 It was isolated in May 2014,when a Gameover botnet was
knocked out.
Companies affected by Ransomware
And many more….
HOW RANSOMWARE WORKS
HOW TO PREVENT BEING A VICTIM
 Keep all of the software on your computer up to
date.
 Make sure automatic updating is turned on to get
all the latest Microsoft security updates and
browser-related components (Java, Adobe, and
the like).
 Keep your firewall turned on.
 Don't open spam email messages or click links on
suspicious websites. (CryptoLocker spreads via
.zip files sent as email attachments, for example.)
Experts advise taking these steps to avoid attacks or
protect yourself after an attack:
Use reputable antivirus software and a firewall.
Back up often.
Exercise caution.
Disconnect from the Internet.
Alert authorities.
Update your security software.
REMOVAL OF MALWARES FROM
WINDOWS PC
Step 1: Enter Safe Mode
Step 2: Delete Temporary Files
Step 3: Download Malware Scanners
Step 4: Run a Scan With Malwarebytes
Step 5: Fix Your Web Browser
Step 6: Recover Your Files If Windows Is Corrupt
FEW BEST MALWARE REMOVAL TOOLS
 Spybot Search & Destroy (Windows, Freeware)
 SUPERAntiSpyware (Windows, $30)
 ComboFix (Windows, Freeware)
 Malwarebytes' Anti-Malware (Windows, $25)
 HijackThis (Windows, Freeware)
TOX – Free Ransomware Toolkit
Continue….
 'Tox' Offers Free build-your-own Ransomware
Malware Toolkit.
 Tox is completely free to use.
 One dark web hacker has released this for anyone
to download and set up their own ransomware
for free.
 Tox, which runs on TOR, requires not much
technical skills to use.
 It is designed in such a way that almost anyone
can easily deploy ransomware in three simple
steps.
Make your own Ransomware
Once a user register with the site, follow these
three simple steps to creating your own
malware:
Type a desired ransom amount you want to ask
victims for.
Provide an additional note in the "Cause", the
message that will alert victims that they are
being held hostage to a piece of malware.
Finally, you are prompted to fill out a captcha,
and click "Create".
"This process creates an executable of about 2MB that
is disguised as a .scr file.
Then the Tox [users] distribute and install as they see
fit. The Tox site (runs on the TOR network) will track the
installs and profit. To withdraw funds, you need only
supply a receiving Bitcoin address.“
- McAfee explains..
CONCLUSION
When it comes to malware attacks, knowledge is
the best possible weapon to prevent them.
Be careful what you click!!
Preventive measures should be taken before
Ransomwares establish strong hold.
Keeping all the software updated and getting
latest security updates might help to prevent the
attacks.
REFRENCES
 http://thehackernews.com/2015/05/ransomware-
creator.html
 http://www.spamlaws.com/how-ransomware-
works.html
 http://www.trendmicro.com/vinfo/us/security/definition
/Ransomware
 https://www.microsoft.com/security/portal/mmpc/share
d/ransomware.aspx
 http://www.trendmicro.com/vinfo/us/security/news/cyb
ercrime-and-digital-threats/crypto-ransomware-when-
encryption-breaks-bad
THANK YOU
QUERIES ??

Weitere ähnliche Inhalte

Was ist angesagt? (20)

WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
What is malware
What is malwareWhat is malware
What is malware
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
cyber security
cyber securitycyber security
cyber security
 
Ransomware
Ransomware Ransomware
Ransomware
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Malware
MalwareMalware
Malware
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 

Andere mochten auch

Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareSymantec
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionMohammad Yahya
 

Andere mochten auch (6)

Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of Ransomware
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
What is Ransomware and How to Stay Away from it?
What is Ransomware and How to Stay Away from it?What is Ransomware and How to Stay Away from it?
What is Ransomware and How to Stay Away from it?
 

Ähnlich wie Ransomware

Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
rensomware final ppt
rensomware final pptrensomware final ppt
rensomware final pptKomal Keshwer
 
The malware effects
The malware effectsThe malware effects
The malware effectsViral Parmar
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...RSIS International
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...AshishDPatel1
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...RSIS International
 
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-GuideStep FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guidechrismannering
 
Ransomware - Rameez Shahzada
Ransomware - Rameez ShahzadaRansomware - Rameez Shahzada
Ransomware - Rameez ShahzadaRAMEEZ SHAHZADA
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 

Ähnlich wie Ransomware (20)

Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
rensomware final ppt
rensomware final pptrensomware final ppt
rensomware final ppt
 
The malware effects
The malware effectsThe malware effects
The malware effects
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-GuideStep FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Ransomware - Rameez Shahzada
Ransomware - Rameez ShahzadaRansomware - Rameez Shahzada
Ransomware - Rameez Shahzada
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 

Mehr von Akshita Pillai

Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
Poke-Yoke or Mistake-proofing
Poke-Yoke or Mistake-proofingPoke-Yoke or Mistake-proofing
Poke-Yoke or Mistake-proofingAkshita Pillai
 
Monster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPSMonster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPSAkshita Pillai
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
American sign language
American sign languageAmerican sign language
American sign languageAkshita Pillai
 

Mehr von Akshita Pillai (6)

Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Piggybacking
PiggybackingPiggybacking
Piggybacking
 
Poke-Yoke or Mistake-proofing
Poke-Yoke or Mistake-proofingPoke-Yoke or Mistake-proofing
Poke-Yoke or Mistake-proofing
 
Monster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPSMonster Blood,GOOSEBUMPS
Monster Blood,GOOSEBUMPS
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
American sign language
American sign languageAmerican sign language
American sign language
 

Kürzlich hochgeladen

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Ransomware

  • 1.
  • 2. Contents • What is Cyber Extortion • Definition of Ransomware • History • Types of Ransomware • Famous Ransomwares • How it works? • How to avoid Ransomware • Removal of malwares from PC • TOX • Conclusion • References
  • 3. CYBER EXTORTION • Cyber extortion is an online crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to stop the attack. • Cyber extortions have taken on multiple forms - encrypting data and holding it hostage, stealing data and threatening exposure, and denying access to data.
  • 6. RANSOMWARE DEFINED…  Malware locks out the user’s system and demands ransom.  Creates “Zombie Computer” operated remotely.  Individuals and business targeted.  This form of extortion works on the assumption that the data is important enough to the user that they are willing to pay for recovery.  There is however no guarantee of actual recovery, even after payment is made.
  • 7. HISTORY The first known ransomware was the 1989 "AIDS" trojan (also known as "PC Cyborg") written by Joseph Popp.
  • 8. TYPES OF RANSOMWARE  Encryption Ransomware - Locker Virus and Onion Ransomware  Locker Ransomware - Reveton
  • 9.
  • 10.
  • 12. Reveton  In 2012, a major ransomware worm known as Reveton began to spread.  It is also known as "police trojan".  Its payload displays a warning from a law enforcement agency.  Claiming that the computer had been used for illegal activities, such as downloading pirated software, promoting terrorism, copyright etc.  The warning informs the user that to unlock their system they would have to pay a fine.  To increase the illusion that the computer is being tracked by law enforcement, the screen also displays the computer's IP address and footage from a computer's webcam.
  • 13. CryptoLocker  A Encrypting ransomware reappeared in 2013.  Distributed either as an attachment to a malicious e-mail.  Cryptolocker was also propagated using the Gameover ZeuS.  Encrypts certain types of files stored on local drives using RSA public-key cryptography.  The private key stored only on the malware's control servers.  Offers to decrypt the data if a payment is made by a stated deadline.  Threatens to delete the private key if the deadline passes.  It was isolated in May 2014,when a Gameover botnet was knocked out.
  • 14.
  • 15. Companies affected by Ransomware And many more….
  • 17. HOW TO PREVENT BEING A VICTIM  Keep all of the software on your computer up to date.  Make sure automatic updating is turned on to get all the latest Microsoft security updates and browser-related components (Java, Adobe, and the like).  Keep your firewall turned on.  Don't open spam email messages or click links on suspicious websites. (CryptoLocker spreads via .zip files sent as email attachments, for example.)
  • 18. Experts advise taking these steps to avoid attacks or protect yourself after an attack: Use reputable antivirus software and a firewall. Back up often. Exercise caution. Disconnect from the Internet. Alert authorities. Update your security software.
  • 19. REMOVAL OF MALWARES FROM WINDOWS PC Step 1: Enter Safe Mode Step 2: Delete Temporary Files Step 3: Download Malware Scanners Step 4: Run a Scan With Malwarebytes Step 5: Fix Your Web Browser Step 6: Recover Your Files If Windows Is Corrupt
  • 20.
  • 21.
  • 22. FEW BEST MALWARE REMOVAL TOOLS  Spybot Search & Destroy (Windows, Freeware)  SUPERAntiSpyware (Windows, $30)  ComboFix (Windows, Freeware)  Malwarebytes' Anti-Malware (Windows, $25)  HijackThis (Windows, Freeware)
  • 23. TOX – Free Ransomware Toolkit
  • 24. Continue….  'Tox' Offers Free build-your-own Ransomware Malware Toolkit.  Tox is completely free to use.  One dark web hacker has released this for anyone to download and set up their own ransomware for free.  Tox, which runs on TOR, requires not much technical skills to use.  It is designed in such a way that almost anyone can easily deploy ransomware in three simple steps.
  • 25. Make your own Ransomware Once a user register with the site, follow these three simple steps to creating your own malware: Type a desired ransom amount you want to ask victims for. Provide an additional note in the "Cause", the message that will alert victims that they are being held hostage to a piece of malware. Finally, you are prompted to fill out a captcha, and click "Create".
  • 26. "This process creates an executable of about 2MB that is disguised as a .scr file. Then the Tox [users] distribute and install as they see fit. The Tox site (runs on the TOR network) will track the installs and profit. To withdraw funds, you need only supply a receiving Bitcoin address.“ - McAfee explains..
  • 27. CONCLUSION When it comes to malware attacks, knowledge is the best possible weapon to prevent them. Be careful what you click!! Preventive measures should be taken before Ransomwares establish strong hold. Keeping all the software updated and getting latest security updates might help to prevent the attacks.
  • 28. REFRENCES  http://thehackernews.com/2015/05/ransomware- creator.html  http://www.spamlaws.com/how-ransomware- works.html  http://www.trendmicro.com/vinfo/us/security/definition /Ransomware  https://www.microsoft.com/security/portal/mmpc/share d/ransomware.aspx  http://www.trendmicro.com/vinfo/us/security/news/cyb ercrime-and-digital-threats/crypto-ransomware-when- encryption-breaks-bad