ransomware by lokesh

22
Presented By T.SAI SANTHOSH III B.TECH CSE 14701A0581

Upload: lokesh-bysani

Post on 12-Apr-2017

53 views

Category:

Internet


1 download

TRANSCRIPT

Page 1: Ransomware by lokesh

Presented By

T.SAI SANTHOSHIII B.TECH CSE14701A0581

Page 2: Ransomware by lokesh

Contents• What is Cyber Extortion?• Definition of Ransomware• History• Types of Ransomware• Famous Ransomwares• How it works?• How to avoid Ransomware?• Removal of malwares from PC• Conclusion• References

Page 3: Ransomware by lokesh

CYBER EXTORTION

• Cyber extortion is an online crime involving an attack or threat against an enterprise, person with a demand for money to stop the attack.

• Cyber extortions have taken on multiple forms encrypting data and holding it hostage, stealing data and threatening exposure, and denying access to data.

Page 4: Ransomware by lokesh

Continue…

CYBER EXTORTION

RANSOMWARE DOS ATTACK

Page 5: Ransomware by lokesh

RANSOMWARE DEFINED… Malware locks out the users system and demands

ransom. Creates “Zombie Computer” - operated remotely. Mainly business individuals are targeted. This form of extortion works on the assumption that

the data is important enough to the user that they are willing to pay money for recovery.

There is however no guarantee of actual recovery of data , even after payment is made.

Page 6: Ransomware by lokesh

HISTORY

The first known ransomware was the 1989 "AIDS" trojan (also known as "PC Cyborg") written by Joseph Popp.

later young and yung stated – 1st ransomware is ineffective.

Page 7: Ransomware by lokesh

FAMOUS RANSOMWARE

Reveton CryptoLocker

Page 8: Ransomware by lokesh

Reveton In 2012, a major ransomware worm known as Reveton began

to spread. It is also known as "police trojan". Its payload displays a warning from a law enforcement agency. Claiming that the computer had been used for illegal

activities, such as downloading pirated software, promoting terrorism, copyright etc.

The warning informs the user that to unlock their system they would have to pay a fine.

To increase the illusion that the computer is being tracked by law enforcement, the screen also displays the computer's IP address and footage from a computer's webcam.

Page 9: Ransomware by lokesh
Page 10: Ransomware by lokesh

CryptoLocker A Encrypting ransomware reappeared in 2013. Distributed either as an attachment to a malicious e-mail. Cryptolocker was also propagated using the Gameover ZeuS. Encrypts certain types of files stored on local drives using

RSA public-key cryptography. The private key stored only on the malware's control servers. Offers to decrypt the data if a payment is made by a stated

deadline. Threatens to delete the private key if the deadline passes. It was isolated in May 2014,when a Gameover botnet was

knocked out.

Page 11: Ransomware by lokesh
Page 12: Ransomware by lokesh

Companies affected by Ransomware

And many more….

Page 13: Ransomware by lokesh

HOW RANSOMWARE WORKS

Page 14: Ransomware by lokesh

HOW TO PREVENT BEING A VICTIM Keep all of the software on your computer up to

date. Make sure automatic updating is turned on to get all

the latest Microsoft security updates and browser-related components (Java, Adobe, and the like).

Keep your firewall turned on. Don't open spam email messages or click links on

suspicious websites. (CryptoLocker spreads via .zip files sent as email attachments, for example.)

Page 15: Ransomware by lokesh

Experts advise taking these steps to avoid attacks orprotect yourself after an attack:

Use reputable antivirus software and a firewall.Back up often. Exercise caution. Disconnect from the Internet. Alert authorities. Update your security software.

Page 16: Ransomware by lokesh

REMOVAL OF MALWARES FROM WINDOWS PC

Step 1: Enter Safe ModeStep 2: Delete Temporary FilesStep 3: Download Malware ScannersStep 4: Run a Scan With MalwarebytesStep 5: Fix Your Web BrowserStep 6: Recover Your Files If Windows Is Corrupt

Page 17: Ransomware by lokesh
Page 18: Ransomware by lokesh
Page 19: Ransomware by lokesh

FEW BEST MALWARE REMOVAL TOOLS

Spybot Search & Destroy (Windows, Freeware)

SUPERAntiSpyware (Windows, $30) ComboFix (Windows, Freeware) Malwarebytes' Anti-Malware (Windows, $25) HijackThis (Windows, Freeware)

Page 20: Ransomware by lokesh

CONCLUSION

When it comes to malware attacks, knowledge is the best possible weapon to prevent them. Be careful what you click!! Preventive measures should be taken before Ransomwares establish strong hold. Keeping all the software updated and getting latest security updates might help to prevent the attacks.

Page 21: Ransomware by lokesh

REFRENCES http://thehackernews.com/2015/05/ransomware-

creator.html http://www.spamlaws.com/how-ransomware-works.html http://www.trendmicro.com/vinfo/us/security/

definition/Ransomware https://www.microsoft.com/security/portal/mmpc/

shared/ransomware.aspx http://www.trendmicro.com/vinfo/us/security/news/

cybercrime-and-digital-threats/crypto-ransomware-when-encryption-breaks-bad

Page 22: Ransomware by lokesh

THANK YOU

QUERIES ??