SlideShare a Scribd company logo
1 of 3
ABOUT.ME/D3PAK
RANSOMWARE
Ransomware type of malware which restricts access to the computer system that it infects, and
demands a ransom paid to the creator(s) of the malware in order for the restriction to be
removed. It deliberately locks you out of your computer or your files, and then demands money
to let you back in.
Some snapshots :
SOME FACTS
 Symantec estimates that nearly 3% of victims end up paying ransoms, which translates
into more than $5 million a year paid to cybercriminals.
 Malware uses the Rijndael algorithm for file encryption. This is a symmetric cipher..
 Some Law enforcement agencies , big giant industries trapped into this
GENERALLY SORTS OF RANSOMWARE
File-encrypting ransomware. Leaves your applications running just fine, but scrambles your data
files so you can't open them any more. This ransomware usually pops up a window offering you
sell you the decryption key.
Lockscreen ransomware. Pops up a window that takes over your computer or mobile device, so
you can't use any other applications, make calls, or run your anti-virus. This ransomware usually
accuses you of some sort of crime, but offers to let you keep on working once you have paid a
"fine."
The good news is that with a bit of technical savvy, or help from a friend that has the savvy, it is
usually possible to work your way past most lockscreen ransomware without paying up.
The bad news is that with most recent file-encrypting ransomware – well-known ones are
CryptoLocker, CryptoWall and TeslaCrypt – there isn't a savvy shortcut.
 Loosely speaking, if you don't have a backup of your scrambled files, you are stuck.
 If the crooks have implemented the encryption process properly, the only way to get
your files back is to to pay them for a copy of the decryption key.
 That means that the malware can scramble your data, but the key needed to
unscramble it never shows up on your computer – not on disk, and not even in memory.
ABOUT.ME/D3PAK
CONCEPT :
The C&C issues a public key for the infected host and are stored with other information in values
under the registry key HKEY_CURRENT_USERSoftwareCryptoLocker_0388. The public key then
seeks a wide range of file extensions on the victim’s machine and further starts the encryption
process. The private key that is used to decryption of the infected files is not saved on the
computer, but on a C&C server.
SOME ARTIFACTS :
 Spawns either ctfmon.exe or svchost.exe (randomly chosen) where its child process
injects its injected own code & sample from %TEMP% folder.
 C:  Documents and Settings  <User>  Application Data  <random name>.exe
 C:  Users  <User>  AppData  Local  <random name>.exe
 KEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “CryptoLocker”
 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce
“*CryptoLocker”
 HKEY_CURRENT_USERSoftwareCryptoLocker
 rack-core.bin .... parse and analyse the files so on
WHAT TO DO?
So the big question, usually left unanswered in technical discussions of ransomware, is, "Should
you pay?"
At a typical price point around $300 to $600 (£200 to £400), ransomware can be expensive.
For better or for worse, most ransomware gangs have acquired a bit of an "honour among
thieves" reputation, so that if you do pay over the money, you almost certainly will get your files
back. On the other hand, law enforcement and security experts are very likely to say, "These are
crooks! This is extortion! If you can possibly take it on the chin, we urge you NOT TO PAY!"
But those are easy words to say if it's not your data on the line.
Interestingly, one reason for not paying extortionists is that there is often no way to ensure that
they won't come back to gouge you for a second payment, or a third, and so on. But, as
described above, modern file-scrambling ransomware doesn't actually steal your files. The
crooks don't have a copy of anything of yours, just the private key to unlock the scrambled files
on your own computer.
ABOUT.ME/D3PAK
In theory, then, once you've paid up, decrypted your files and disinfected the malware, you and
the crooks are back on an even footing, and they can't come back for more.
SOME THIRD PARTY UTILITIES, CONCEPT YOU CAN TWEAK :
1: Restart your system with safe mode
2 :At least update AV, Antimwalware etc and scan
3 :You can install :
 Malwarebytes Anti-Malware
 RogueKiller
 Adwcleaner or Rootkit Remover
4: Scan and delete Ransomeware or maljunks variants
For ex :
 C:Users<YOUR USERNAME>AppDataRoamingRandomFileName.exe
 C:WINDOWSsystem32msctfime.ime
 Delete TEMP/Prefetch folders data
5 : Restore from system volume information(if enabled)
SHOULD YOU PAY?
We're not going to moralise about whether it's always unacceptable to support criminality by
paying up, even if you are in a difficult position. We'll leave you with plainer advice, namely, "It's
OK to pay, but it's much better not to."
So, keep these two points in mind:
 Don't pay if you can possibly avoid it, even if it means some personal hassle.
 Take precautions today (e.g. backup, proactive anti-virus, web and email filtering) so
that you avoid getting into a position where you ever need to pay.
Remember: if you don't have backups and you lose your laptop, you're in the same trouble –
worse, actually – than you would be with ransomware. After all, there's no-one you can pay any
amount of money to in order to get your data back if your hard disk.
In future if you dont want to trap from these kind of nasty stuff , then you need to strengthen your
system security. Do not open suspicious e-mails or uninvited attachment Update the version and
patches of your qualified antivirus program Firewalls (NIDS, IDPS), Use addons related to prevent from
Drive by downloads , droppers or any automated scripts etc. Group Policy Object of the computer to
restrict the registry key (syskey). In Local security policy under Software Restriction Polices define
Additional Rules. Regarding research or reverse eng use isolated architecture environment.
Attachment filters But beware Hackers /Crackers are much smarter. Lots of things are there so as
primary Prevention is better then cure.
Src: Reddit , comodo , naked security, F5 , adlice,bleeping computer
--------------------------------------------------------------------------------------------------------------------------------------------
BE SMART & CREATIVE IN CYBER WORLD
D3pak Kumar
IT Security & Cyber-Forensic
http://in.linkedin.com/in/d3pak/
C|EH , CHFi , ECSA , CCS , CCF , MCA , OPSEC , CSICS , GFSU

More Related Content

What's hot

Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

What's hot (20)

Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Is Your Data Secure?
Is Your Data Secure?Is Your Data Secure?
Is Your Data Secure?
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware Attack
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Wannacry
WannacryWannacry
Wannacry
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanMalware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Backdoor
BackdoorBackdoor
Backdoor
 
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Malware
MalwareMalware
Malware
 

Viewers also liked

Regering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uitRegering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uit
Thierry Debels
 
Pupin formation-puppet-les-bases
Pupin formation-puppet-les-basesPupin formation-puppet-les-bases
Pupin formation-puppet-les-bases
CERTyou Formation
 
AWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant ApplicatonsAWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant Applicatons
Amazon Web Services
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
at MicroFocus Italy ❖✔
 
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancéesAlphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm
 

Viewers also liked (20)

Resolucion 034
Resolucion 034Resolucion 034
Resolucion 034
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Regering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uitRegering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uit
 
Pupin formation-puppet-les-bases
Pupin formation-puppet-les-basesPupin formation-puppet-les-bases
Pupin formation-puppet-les-bases
 
ArcServe UDP
ArcServe UDPArcServe UDP
ArcServe UDP
 
Comic1
Comic1Comic1
Comic1
 
Guy Verhofstadt start imagocampagne Molenbeek
Guy Verhofstadt start imagocampagne MolenbeekGuy Verhofstadt start imagocampagne Molenbeek
Guy Verhofstadt start imagocampagne Molenbeek
 
わかる中級英文法 Grammar in Use Unit 89 each and every
わかる中級英文法 Grammar in Use Unit 89 each and everyわかる中級英文法 Grammar in Use Unit 89 each and every
わかる中級英文法 Grammar in Use Unit 89 each and every
 
Good morning wishes with flowers
Good morning wishes with flowersGood morning wishes with flowers
Good morning wishes with flowers
 
The State of Fintech in Japan
The State of Fintech in JapanThe State of Fintech in Japan
The State of Fintech in Japan
 
AWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant ApplicatonsAWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant Applicatons
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace MaganhaCLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
 
CLASS 2016 - Rafael Soares
CLASS 2016 - Rafael SoaresCLASS 2016 - Rafael Soares
CLASS 2016 - Rafael Soares
 
Forti cloud
Forti cloudForti cloud
Forti cloud
 
わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3
わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3
わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3
 
わかる中級英文法 Grammar in Use Unit 27 must
わかる中級英文法 Grammar in Use Unit 27 mustわかる中級英文法 Grammar in Use Unit 27 must
わかる中級英文法 Grammar in Use Unit 27 must
 
Dam chuyen 37m wanchai hong kong
Dam chuyen 37m wanchai hong kongDam chuyen 37m wanchai hong kong
Dam chuyen 37m wanchai hong kong
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancéesAlphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
 

Similar to Ransomware

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Discussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docxDiscussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docx
JeniceStuckeyoo
 

Similar to Ransomware (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Discussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docxDiscussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docx
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

More from Deepak Kumar (D3)

More from Deepak Kumar (D3) (20)

Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Forensics
Cyber Forensics Cyber Forensics
Cyber Forensics
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
THINK
THINKTHINK
THINK
 
Cyber Security Tips
Cyber Security TipsCyber Security Tips
Cyber Security Tips
 
CISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAPCISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAP
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
21st Century Cyber Forensics
21st Century Cyber Forensics21st Century Cyber Forensics
21st Century Cyber Forensics
 
Phishing
PhishingPhishing
Phishing
 
IoT
IoTIoT
IoT
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Success Mantra
Success MantraSuccess Mantra
Success Mantra
 
Facebook Security Tips
Facebook Security TipsFacebook Security Tips
Facebook Security Tips
 
DDOS
DDOS DDOS
DDOS
 
Registry Registrar Registrant
Registry Registrar RegistrantRegistry Registrar Registrant
Registry Registrar Registrant
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Ransomware

  • 1. ABOUT.ME/D3PAK RANSOMWARE Ransomware type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed. It deliberately locks you out of your computer or your files, and then demands money to let you back in. Some snapshots : SOME FACTS  Symantec estimates that nearly 3% of victims end up paying ransoms, which translates into more than $5 million a year paid to cybercriminals.  Malware uses the Rijndael algorithm for file encryption. This is a symmetric cipher..  Some Law enforcement agencies , big giant industries trapped into this GENERALLY SORTS OF RANSOMWARE File-encrypting ransomware. Leaves your applications running just fine, but scrambles your data files so you can't open them any more. This ransomware usually pops up a window offering you sell you the decryption key. Lockscreen ransomware. Pops up a window that takes over your computer or mobile device, so you can't use any other applications, make calls, or run your anti-virus. This ransomware usually accuses you of some sort of crime, but offers to let you keep on working once you have paid a "fine." The good news is that with a bit of technical savvy, or help from a friend that has the savvy, it is usually possible to work your way past most lockscreen ransomware without paying up. The bad news is that with most recent file-encrypting ransomware – well-known ones are CryptoLocker, CryptoWall and TeslaCrypt – there isn't a savvy shortcut.  Loosely speaking, if you don't have a backup of your scrambled files, you are stuck.  If the crooks have implemented the encryption process properly, the only way to get your files back is to to pay them for a copy of the decryption key.  That means that the malware can scramble your data, but the key needed to unscramble it never shows up on your computer – not on disk, and not even in memory.
  • 2. ABOUT.ME/D3PAK CONCEPT : The C&C issues a public key for the infected host and are stored with other information in values under the registry key HKEY_CURRENT_USERSoftwareCryptoLocker_0388. The public key then seeks a wide range of file extensions on the victim’s machine and further starts the encryption process. The private key that is used to decryption of the infected files is not saved on the computer, but on a C&C server. SOME ARTIFACTS :  Spawns either ctfmon.exe or svchost.exe (randomly chosen) where its child process injects its injected own code & sample from %TEMP% folder.  C: Documents and Settings <User> Application Data <random name>.exe  C: Users <User> AppData Local <random name>.exe  KEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “CryptoLocker”  HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce “*CryptoLocker”  HKEY_CURRENT_USERSoftwareCryptoLocker  rack-core.bin .... parse and analyse the files so on WHAT TO DO? So the big question, usually left unanswered in technical discussions of ransomware, is, "Should you pay?" At a typical price point around $300 to $600 (£200 to £400), ransomware can be expensive. For better or for worse, most ransomware gangs have acquired a bit of an "honour among thieves" reputation, so that if you do pay over the money, you almost certainly will get your files back. On the other hand, law enforcement and security experts are very likely to say, "These are crooks! This is extortion! If you can possibly take it on the chin, we urge you NOT TO PAY!" But those are easy words to say if it's not your data on the line. Interestingly, one reason for not paying extortionists is that there is often no way to ensure that they won't come back to gouge you for a second payment, or a third, and so on. But, as described above, modern file-scrambling ransomware doesn't actually steal your files. The crooks don't have a copy of anything of yours, just the private key to unlock the scrambled files on your own computer.
  • 3. ABOUT.ME/D3PAK In theory, then, once you've paid up, decrypted your files and disinfected the malware, you and the crooks are back on an even footing, and they can't come back for more. SOME THIRD PARTY UTILITIES, CONCEPT YOU CAN TWEAK : 1: Restart your system with safe mode 2 :At least update AV, Antimwalware etc and scan 3 :You can install :  Malwarebytes Anti-Malware  RogueKiller  Adwcleaner or Rootkit Remover 4: Scan and delete Ransomeware or maljunks variants For ex :  C:Users<YOUR USERNAME>AppDataRoamingRandomFileName.exe  C:WINDOWSsystem32msctfime.ime  Delete TEMP/Prefetch folders data 5 : Restore from system volume information(if enabled) SHOULD YOU PAY? We're not going to moralise about whether it's always unacceptable to support criminality by paying up, even if you are in a difficult position. We'll leave you with plainer advice, namely, "It's OK to pay, but it's much better not to." So, keep these two points in mind:  Don't pay if you can possibly avoid it, even if it means some personal hassle.  Take precautions today (e.g. backup, proactive anti-virus, web and email filtering) so that you avoid getting into a position where you ever need to pay. Remember: if you don't have backups and you lose your laptop, you're in the same trouble – worse, actually – than you would be with ransomware. After all, there's no-one you can pay any amount of money to in order to get your data back if your hard disk. In future if you dont want to trap from these kind of nasty stuff , then you need to strengthen your system security. Do not open suspicious e-mails or uninvited attachment Update the version and patches of your qualified antivirus program Firewalls (NIDS, IDPS), Use addons related to prevent from Drive by downloads , droppers or any automated scripts etc. Group Policy Object of the computer to restrict the registry key (syskey). In Local security policy under Software Restriction Polices define Additional Rules. Regarding research or reverse eng use isolated architecture environment. Attachment filters But beware Hackers /Crackers are much smarter. Lots of things are there so as primary Prevention is better then cure. Src: Reddit , comodo , naked security, F5 , adlice,bleeping computer -------------------------------------------------------------------------------------------------------------------------------------------- BE SMART & CREATIVE IN CYBER WORLD D3pak Kumar IT Security & Cyber-Forensic http://in.linkedin.com/in/d3pak/ C|EH , CHFi , ECSA , CCS , CCF , MCA , OPSEC , CSICS , GFSU