SlideShare a Scribd company logo
1 of 9
Mumbere Joab
RANSOMWARE ATTACKS
Case study: The Reveton Ransomware Attacks
Reveton
What is a Ransomware?
Ransomware is malware for data kidnapping or an exploit in which the
attacker encrypts the victim's data and demands payment for the
decryption key.
Why are Ransomware attacks on the rise?
 Rising Number Of Unemployed I.T Geeks.
As is the case with many crimes committed outside the Internet, money is a
major motivator for many cyber criminals. Especially when the dangers of
criminality are less apparent when you're hiding behind a network, the
perception of low risk and very high financial reward prompts many cyber
criminals to engage in Ransomware attacks
 Weak Organizational policies on privacy and access of I.T Infrastructure.
This is involves granting access to unauthorized people who may end up
using that opportunity to carryout the attack if they are able to access the severs ,
network or even workstations .
 Increasing use of the internet by organizations and individuals
The Increased use the internet by organizations and individuals to store and
share sensitive information creates a favorable conditions for the attackers to lay
there traps because they know how sensitive the information is to victim and
they assured of a big pay at the end of the day while on panics to restore their
information.
 Increasing use of counterfeit software especially in developing countries.
Mostly of these commonly know as Cracks have contain malicious scripts that
can be used to set a Ransomware attack on the users as long as they are
connected on the network
Why are Ransomware attacks on the rise?
 Structurally motivated attacks
Beyond the causes that motivate the attackers, the environment in
which the attack is committed also serves to explain the prevalence of
the phenomenon. While more and more personal and sensitive
information is stored online, this increases the potential rewards for a r
ansom attack. Neither computer security nor applications like email
filters have improved dramatically in terms of coverage. According to
the anti-virus manufacturer Norton, for example, as many as 41 percen
t of computers did not have up-to-date security protection in 2012.
 Personally motivated attacks
The attackers what they do, including their crimes is often the cause of
personal emotions and vendettas. From the disgruntled employee ,
installing a malware on office computers to a jealous boyfriend
hacking into a girlfriend's social media accounts or a teenager taking
down a school website just to prove that he could do it, many cyber
crimes are essentially crimes of passion committed over the Internet.
Many of these crimes, however, can still have very serious impacts and
cause considerable property damage.
What can you do to prevent Ransomware
attacks on your own computer?
• Make sure Your antivirus is updated with a real time protection mechanism and internet
Security plans .
• Always block Pop Ups from your web browsers since most of there attacks are triggered
through unnecessary pop ups.
• Always install updated Software patches from the Operating system venders because they
contain some of these security mechanisms that protect your computer from any possible
attack.
• For Organization they should have a well developed IT policy to restrict access to certain
untrusted sites to avoid any possible attacks.
• A good relationship between the company and IT officers is step number one toward avoid
ing any sorts on intended attacks
• Before you are attacked, a back and recover plan is always paramount for the safety of one
s data. So don’t wait to be attacked and then remember to backup
• Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena
ble one see potentially dangerous files
• If you discover a rogue or unknown process on your machine, disconnect it immediately
from the internet or other network connections such as Wi-Fi this will prevent the infection
from spreading.
How do you think victims should
respond to Ransomware attacks?
 Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you
can realize that it was just a mare attack you find your self paying for what you didn’t
commit .
 Shutdown the infected machine to avoid further encryption of files.
 Disconnect the affected device from the network to a further attack on the other devices
on the network.
 Don’t pay up any amount of money since you already know that the guys are crooks
 Taking to a technician you trust for help.
 Try using boot-time antivirus Sophos Antivirus.
 Clean Up the infected Machine and use a data recovery software to recover your
information.
 For Organization follow the disaster recovery plan it could have a fast solution to avoid ma
ss loss of data and down times.
Do they have an ethical obligation
to future victims?
Yes they do..
 A Backup plan is always necessary before any attack to avoid data loss in case there is an
attack.
 Using an Updated antivirus and anti malware software is necessary to detect and block any
attacks .
 Computer users should avoid using counterfeited software because they are used as honey
ports by attacks.
 Computer users should enable the display of file extensions so that they can be able to tell
which files are dangerous to there computer systems as away to limit chance of being
attacked
 Research is necessary to keep computer users informed about the on going attacks, how
to prevents and solve these attacks in case they are meet.
 Internet users should always avoid responding positively to scareware for these are ways
through which ransom attacks are triggered
Ransomware attacks reveton

More Related Content

What's hot

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Ransomware
RansomwareRansomware
RansomwareG Prachi
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response ManagementKeith Smith
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 

What's hot (20)

Ransomware
RansomwareRansomware
Ransomware
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Ransomware
RansomwareRansomware
Ransomware
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response Management
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Baselining Logs
Baselining LogsBaselining Logs
Baselining Logs
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 

Similar to Ransomware attacks reveton

Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxTier3MD
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices EyesOpen Association
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 

Similar to Ransomware attacks reveton (20)

Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Synchronized security
Synchronized securitySynchronized security
Synchronized security
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 

Recently uploaded

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Recently uploaded (20)

Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

Ransomware attacks reveton

  • 1. Mumbere Joab RANSOMWARE ATTACKS Case study: The Reveton Ransomware Attacks
  • 3. What is a Ransomware? Ransomware is malware for data kidnapping or an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key.
  • 4. Why are Ransomware attacks on the rise?  Rising Number Of Unemployed I.T Geeks. As is the case with many crimes committed outside the Internet, money is a major motivator for many cyber criminals. Especially when the dangers of criminality are less apparent when you're hiding behind a network, the perception of low risk and very high financial reward prompts many cyber criminals to engage in Ransomware attacks  Weak Organizational policies on privacy and access of I.T Infrastructure. This is involves granting access to unauthorized people who may end up using that opportunity to carryout the attack if they are able to access the severs , network or even workstations .  Increasing use of the internet by organizations and individuals The Increased use the internet by organizations and individuals to store and share sensitive information creates a favorable conditions for the attackers to lay there traps because they know how sensitive the information is to victim and they assured of a big pay at the end of the day while on panics to restore their information.  Increasing use of counterfeit software especially in developing countries. Mostly of these commonly know as Cracks have contain malicious scripts that can be used to set a Ransomware attack on the users as long as they are connected on the network
  • 5. Why are Ransomware attacks on the rise?  Structurally motivated attacks Beyond the causes that motivate the attackers, the environment in which the attack is committed also serves to explain the prevalence of the phenomenon. While more and more personal and sensitive information is stored online, this increases the potential rewards for a r ansom attack. Neither computer security nor applications like email filters have improved dramatically in terms of coverage. According to the anti-virus manufacturer Norton, for example, as many as 41 percen t of computers did not have up-to-date security protection in 2012.  Personally motivated attacks The attackers what they do, including their crimes is often the cause of personal emotions and vendettas. From the disgruntled employee , installing a malware on office computers to a jealous boyfriend hacking into a girlfriend's social media accounts or a teenager taking down a school website just to prove that he could do it, many cyber crimes are essentially crimes of passion committed over the Internet. Many of these crimes, however, can still have very serious impacts and cause considerable property damage.
  • 6. What can you do to prevent Ransomware attacks on your own computer? • Make sure Your antivirus is updated with a real time protection mechanism and internet Security plans . • Always block Pop Ups from your web browsers since most of there attacks are triggered through unnecessary pop ups. • Always install updated Software patches from the Operating system venders because they contain some of these security mechanisms that protect your computer from any possible attack. • For Organization they should have a well developed IT policy to restrict access to certain untrusted sites to avoid any possible attacks. • A good relationship between the company and IT officers is step number one toward avoid ing any sorts on intended attacks • Before you are attacked, a back and recover plan is always paramount for the safety of one s data. So don’t wait to be attacked and then remember to backup • Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena ble one see potentially dangerous files • If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections such as Wi-Fi this will prevent the infection from spreading.
  • 7. How do you think victims should respond to Ransomware attacks?  Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you can realize that it was just a mare attack you find your self paying for what you didn’t commit .  Shutdown the infected machine to avoid further encryption of files.  Disconnect the affected device from the network to a further attack on the other devices on the network.  Don’t pay up any amount of money since you already know that the guys are crooks  Taking to a technician you trust for help.  Try using boot-time antivirus Sophos Antivirus.  Clean Up the infected Machine and use a data recovery software to recover your information.  For Organization follow the disaster recovery plan it could have a fast solution to avoid ma ss loss of data and down times.
  • 8. Do they have an ethical obligation to future victims? Yes they do..  A Backup plan is always necessary before any attack to avoid data loss in case there is an attack.  Using an Updated antivirus and anti malware software is necessary to detect and block any attacks .  Computer users should avoid using counterfeited software because they are used as honey ports by attacks.  Computer users should enable the display of file extensions so that they can be able to tell which files are dangerous to there computer systems as away to limit chance of being attacked  Research is necessary to keep computer users informed about the on going attacks, how to prevents and solve these attacks in case they are meet.  Internet users should always avoid responding positively to scareware for these are ways through which ransom attacks are triggered