SlideShare a Scribd company logo
1 of 33
The
rise
of
ransomware
Hello!I am Tharindu Edirisinghe
You can find me at ….
tharindue.blogspot.com @thariyarox https://lk.linkedin.com/in/ediri ediri@live.com
The FBI reported that cyber criminals used
ransomware to extort $209 million from
enterprise organizations in the first three months
of 2016 alone.
Source :
http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/
The name “ransomware” refers to a type of malware that is designed to infect machines,
encrypt as many files as possible and hold the decryption key for ransom until the
victim submits the required payment.
While documented complaints of modern ransomware date back to 2005, the malware
has recently gained a new popularity. In 2015 alone, there were nearly 407,000
attempted ransomware infections and over $325 million extorted from victims.
Souce : https://www.cyberark.com/resource/cyberark-labs-ransomware/
There is another variant of ransomware that blocks the usage of the
device with the same goal of extracting payment from the victim.
This behavior includes spawning multiple messages across the
screen disrupting user application usage or inhibiting the normal
boot process of the operating system with displaying a ransom
message instead of a user login screen.
Source : http://cyberthreatalliance.org/cryptowall-report.pdf
In cryptography, encryption is the process of encoding messages or information in such a
way that only authorized parties can access it.
Source : https://en.wikipedia.org/wiki/Encryption
Image Source :
http://kryptophone.kryptotel.net/faq/encryption/index.html
Image Source: http://www.sqlservercentral.com/blogs/zoras-sql-
tips/2014/09/11/understanding-the-core-of-cryptography-in-sql-server/print/
Image Source: http://www.sqlservercentral.com/blogs/zoras-sql-
tips/2014/09/11/understanding-the-core-of-cryptography-in-sql-server/print/
demo
Once the ransomware was triggered to execute, 90% of the samples analyzed first attempted to
communicate back to an attacker-managed key server, which held the unique public key used to encrypt files
on the machine. In 20% of all cases, if the connection could not be established, the ransomware would fail. Yet,
a full 70% of ransomware samples were able to execute using a default public key, even if a unique key could
not be retrieved from the key server. Notably, this approach can be less effective for the attacker, as a victim
can potentially use a single default decryption key that has already been purchased to decrypt all files that
were encrypted using the same key. The remaining 10% of samples included a unique key generator within the
ransomware file itself, thus eliminating the need for an outside connection. Based on this observation, the
research team noted that if organizations could limit the ransomware’s ability to establish an outside
connection, organizations could typically either prevent the ransomware from executing or force the
attackers to use a default key, thus minimizing the financial impact of the attack.
Souce : https://www.cyberark.com/resource/cyberark-labs-ransomware/
1. Ransomware is Evolving by the Hour
Unlike traditional malware, which is frequently reused across a wide range of targets,
ransomware strains are typically mutated for each new victim. Traditional anti-virus
solutions that rely on blacklists are typically ineffective in preventing ransomware because
they simply can’t keep up with the thousands of new samples produced each day. To
effectively protect against ransomware risks, organizations can’t just protect against known
malware; they also need to protect against unknown malicious applications.
2. A Common Path to Encryption
The team observed what actions were executed by different ransomware samples, and
learned the samples across different families all followed similar subsequent processes.
Typically, the malware first attempted to communicate back to an attacker-managed key
server, which held the unique public key used to encrypt files on the machine. Second, the
ransomware began to scan the infected machines to locate specific files types. Third, upon
locating the files, the ransomware began the encryption process, while working to maximize
the number of impacted machines.
3. Ransom Payment Method of Choice
To receive the key needed to decrypt the impacted files, users were required to submit
payment – the ransom – to the attackers. Payment was typically demanded in Bitcoin, and
for Bitcoin novices, some attackers went so far as to set up “help desks” to help victims
purchase Bitcoin and complete the funds transfer.
4. Ransomware Seeks Admin Rights
In 70% of tested cases, ransomware attempted to gain local administrator rights once
activated. But interestingly, only 10% of the tested files failed if these rights could not be
attained. This shows that even though the removal of local administrator rights from
standard users is a best practice and certainly could have prevented some of the
ransomware, this measure must be layered with application control to reliably protect
against file encryption.
5. A Common Denominator
Testing by CyberArk Labs demonstrated that a highly effective way to mitigate the risk of
ransomware attacks is to prevent unknown applications, including unknown ransomware,
from gaining the read, write and edit permissions needed to encrypt files. When tested by
CyberArk Labs, a combined approach of removing local admin rights and application control,
including greylisting, which restricts read, write and modify permissions from unknown
applications was 100 percent effective in preventing ransomware from encrypting files.
https://www.cyberark.com/blog/new-cyberark-labs-research-analyzing-ransomware-
potential-mitigation-strategies/
Shade is a ransomware-type Trojan that emerged in late 2014. The malware is spread via
malicious websites and infected email attachments. After getting into the user’s system,
Shade encrypts files stored on the machine and creates a .txt file containing the ransom note
and instructions from cybercriminals on what to do to get user’s personal files back. Shade
use strong decryption algorithm for each encrypted file, with two random 256-bit AES keys
generated: one is used to encrypt the file’s contents, while the other is used to encrypt the file
name.
Since 2014, Kaspersky Lab and Intel Security prevented more than 27 000 attempts to attack
users with Shade Trojan. Most of the infections occurred in Russia, Ukraine, Germany, Austria
and Kazakhstan. Shade activity was also registered in France, Czech Republic, Italy, and the
US.
Source : https://www.helpnetsecurity.com/2016/07/25/no-more-ransom/
Ransomware is often spread via spam campaigns or exploit kits, but LeChiffre takes a
different approach. LeChiffre developers scan networks for poorly secured, vulnerable
Remote Desktops, log in remotely after cracking them, and then manually run an instance of
the malware to encrypt files and append the extension “.LeChiffre” to them.
Security researchers at Emsisoft already managed to come up with a LeChiffre decrypter,
after discovering that the malware encrypts only the first 8192 bytes of a file and if the file is
bigger than 16999 bytes, and also the last 8192 of the file, using Blowfish
Source : http://www.securityweek.com/lechiffre-ransomware-hits-indian-banks-pharma-
company
Ransomware is a very successful model of attack and its mobile variant is not much different
from its desktop counterpart. Usually, the user is tricked into installing a useful app—for
example, an app that pretends to be Adobe Flash player. Once installed and executed, the
malicious application attempts to encrypt all accessible documents, images, and multimedia
files on the device. When this process is finished, the ransomware application displays a text,
a warning that often seems to come from law enforcement agencies such as the FBI and
instructs the user how to pay to restore files and access to the device.
Some of the most successful Android ransomware families are Simplocker and Koler. The
recently discovered Locker family actually sets a PIN for the device and makes the restore
almost impossible if the
user is not willing to pay the attackers for recovery instructions.
Souce :
https://www.thehaguesecuritydelta.com/media/com_hsd/report/57/document/4aa6-
3786enw.pdf
1. Have a Backup Solution in Place
Access and storage of your data is mission-critical to your business, especially when
dealing with a ransomware attack. If you backup your data routinely, ransom Trojans are
easy to remove. Recover the files from a backup and hope the person at fault learns their
lesson.
2. Keep Software up to Date
Some ransom Trojans target user carelessness (“click this link,” or “open this
attachment”). Others exploit vulnerabilities in software. Keep all your software patched,
especially the most common and popular off-the-shelf products – they are the first ones
a hacker will target.
3. Filter Executables
Disguised as an invoice, an “urgent” document, or a notification that you’ve missed a
delivery -- these are often hidden in ZIP archives. Make sure to filter those and
executables in general.
4. Show File Extensions
By allowing Windows to show file extensions, it makes it difficult for hackers to keep thier
intentions hidden. For example, if a file is really called “Invoice.doc.exe,” then you shouldn’t
allow it to present itself to the user as “Invoice.doc.”
5. Restrict User Privileges
Keep incidents isolated by making sure one infected user does not bring down your entire
network. By limiting machine access to only what it needs it can save your business
significantly in downtime, allowing unaffected users/departments to continue working
productively.
6. Disable Remote Desktop Protocol
Hackers love to use Windows’ native remote access feature and third-party software to
get malicious code onto computers. Although the remote desktop protocol is very useful,
it does not need to be switched on all the time.
7. Get a Security Audit from a Reputable IT Consultant
A credible and experienced IT Consultant, like Lantium, can assess your organization’s
information systems, business processes, and overall cyber presence to help you identify
methods to keep your business protected. By being proactive, you can ensure your
business stays safe in 2017!
Source: http://blog.lantium.com/seven-things-to-protect-your-business-from-
ransomware
The “No More Ransom” website is an initiative by the National High Tech Crime Unit of
the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security
companies – Kaspersky Lab and Intel Security – with the goal to help victims of
ransomware retrieve their encrypted data without having to pay the criminals.
Source : https://www.nomoreransom.org/about-the-project.html
Ransomware Families and Types http://avien.net/blog/ransomware-resources/ransomware-families-and-
types
Analysis of the CryptoWall Version 4 Threat
http://cyberthreatalliance.org/cryptowall-report.pdf
Even the best antivirus likely can't save your files from a ransomware infection
http://www.businessinsider.com/fighting-ransomware-with-antivirus-2016-1
Hewlett Packard Enterprise - Cyber Risk Report 2016
https://www.thehaguesecuritydelta.com/media/com_hsd/report/57/document/4aa6-3786enw.pdf
Shoddy Programming causes new Ransomware to destroy your Data
https://www.bleepingcomputer.com/news/security/shoddy-programming-causes-new-ransomware-to-
destroy-your-data
THANKS!Any questions?
You can find me at ….
tharindue.blogspot.com @thariyarox https://lk.linkedin.com/in/ediri ediri@live.com

More Related Content

Recently uploaded

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationShrmpro
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 

Recently uploaded (20)

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

The Rise of Ransomware

  • 2. Hello!I am Tharindu Edirisinghe You can find me at …. tharindue.blogspot.com @thariyarox https://lk.linkedin.com/in/ediri ediri@live.com
  • 3. The FBI reported that cyber criminals used ransomware to extort $209 million from enterprise organizations in the first three months of 2016 alone. Source : http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/
  • 4.
  • 5.
  • 6. The name “ransomware” refers to a type of malware that is designed to infect machines, encrypt as many files as possible and hold the decryption key for ransom until the victim submits the required payment. While documented complaints of modern ransomware date back to 2005, the malware has recently gained a new popularity. In 2015 alone, there were nearly 407,000 attempted ransomware infections and over $325 million extorted from victims. Souce : https://www.cyberark.com/resource/cyberark-labs-ransomware/
  • 7. There is another variant of ransomware that blocks the usage of the device with the same goal of extracting payment from the victim. This behavior includes spawning multiple messages across the screen disrupting user application usage or inhibiting the normal boot process of the operating system with displaying a ransom message instead of a user login screen. Source : http://cyberthreatalliance.org/cryptowall-report.pdf
  • 8. In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can access it. Source : https://en.wikipedia.org/wiki/Encryption Image Source : http://kryptophone.kryptotel.net/faq/encryption/index.html
  • 11. demo
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Once the ransomware was triggered to execute, 90% of the samples analyzed first attempted to communicate back to an attacker-managed key server, which held the unique public key used to encrypt files on the machine. In 20% of all cases, if the connection could not be established, the ransomware would fail. Yet, a full 70% of ransomware samples were able to execute using a default public key, even if a unique key could not be retrieved from the key server. Notably, this approach can be less effective for the attacker, as a victim can potentially use a single default decryption key that has already been purchased to decrypt all files that were encrypted using the same key. The remaining 10% of samples included a unique key generator within the ransomware file itself, thus eliminating the need for an outside connection. Based on this observation, the research team noted that if organizations could limit the ransomware’s ability to establish an outside connection, organizations could typically either prevent the ransomware from executing or force the attackers to use a default key, thus minimizing the financial impact of the attack. Souce : https://www.cyberark.com/resource/cyberark-labs-ransomware/
  • 18.
  • 19. 1. Ransomware is Evolving by the Hour Unlike traditional malware, which is frequently reused across a wide range of targets, ransomware strains are typically mutated for each new victim. Traditional anti-virus solutions that rely on blacklists are typically ineffective in preventing ransomware because they simply can’t keep up with the thousands of new samples produced each day. To effectively protect against ransomware risks, organizations can’t just protect against known malware; they also need to protect against unknown malicious applications.
  • 20. 2. A Common Path to Encryption The team observed what actions were executed by different ransomware samples, and learned the samples across different families all followed similar subsequent processes. Typically, the malware first attempted to communicate back to an attacker-managed key server, which held the unique public key used to encrypt files on the machine. Second, the ransomware began to scan the infected machines to locate specific files types. Third, upon locating the files, the ransomware began the encryption process, while working to maximize the number of impacted machines.
  • 21. 3. Ransom Payment Method of Choice To receive the key needed to decrypt the impacted files, users were required to submit payment – the ransom – to the attackers. Payment was typically demanded in Bitcoin, and for Bitcoin novices, some attackers went so far as to set up “help desks” to help victims purchase Bitcoin and complete the funds transfer.
  • 22. 4. Ransomware Seeks Admin Rights In 70% of tested cases, ransomware attempted to gain local administrator rights once activated. But interestingly, only 10% of the tested files failed if these rights could not be attained. This shows that even though the removal of local administrator rights from standard users is a best practice and certainly could have prevented some of the ransomware, this measure must be layered with application control to reliably protect against file encryption.
  • 23. 5. A Common Denominator Testing by CyberArk Labs demonstrated that a highly effective way to mitigate the risk of ransomware attacks is to prevent unknown applications, including unknown ransomware, from gaining the read, write and edit permissions needed to encrypt files. When tested by CyberArk Labs, a combined approach of removing local admin rights and application control, including greylisting, which restricts read, write and modify permissions from unknown applications was 100 percent effective in preventing ransomware from encrypting files. https://www.cyberark.com/blog/new-cyberark-labs-research-analyzing-ransomware- potential-mitigation-strategies/
  • 24. Shade is a ransomware-type Trojan that emerged in late 2014. The malware is spread via malicious websites and infected email attachments. After getting into the user’s system, Shade encrypts files stored on the machine and creates a .txt file containing the ransom note and instructions from cybercriminals on what to do to get user’s personal files back. Shade use strong decryption algorithm for each encrypted file, with two random 256-bit AES keys generated: one is used to encrypt the file’s contents, while the other is used to encrypt the file name. Since 2014, Kaspersky Lab and Intel Security prevented more than 27 000 attempts to attack users with Shade Trojan. Most of the infections occurred in Russia, Ukraine, Germany, Austria and Kazakhstan. Shade activity was also registered in France, Czech Republic, Italy, and the US. Source : https://www.helpnetsecurity.com/2016/07/25/no-more-ransom/
  • 25. Ransomware is often spread via spam campaigns or exploit kits, but LeChiffre takes a different approach. LeChiffre developers scan networks for poorly secured, vulnerable Remote Desktops, log in remotely after cracking them, and then manually run an instance of the malware to encrypt files and append the extension “.LeChiffre” to them. Security researchers at Emsisoft already managed to come up with a LeChiffre decrypter, after discovering that the malware encrypts only the first 8192 bytes of a file and if the file is bigger than 16999 bytes, and also the last 8192 of the file, using Blowfish Source : http://www.securityweek.com/lechiffre-ransomware-hits-indian-banks-pharma- company
  • 26. Ransomware is a very successful model of attack and its mobile variant is not much different from its desktop counterpart. Usually, the user is tricked into installing a useful app—for example, an app that pretends to be Adobe Flash player. Once installed and executed, the malicious application attempts to encrypt all accessible documents, images, and multimedia files on the device. When this process is finished, the ransomware application displays a text, a warning that often seems to come from law enforcement agencies such as the FBI and instructs the user how to pay to restore files and access to the device. Some of the most successful Android ransomware families are Simplocker and Koler. The recently discovered Locker family actually sets a PIN for the device and makes the restore almost impossible if the user is not willing to pay the attackers for recovery instructions. Souce : https://www.thehaguesecuritydelta.com/media/com_hsd/report/57/document/4aa6- 3786enw.pdf
  • 27. 1. Have a Backup Solution in Place Access and storage of your data is mission-critical to your business, especially when dealing with a ransomware attack. If you backup your data routinely, ransom Trojans are easy to remove. Recover the files from a backup and hope the person at fault learns their lesson. 2. Keep Software up to Date Some ransom Trojans target user carelessness (“click this link,” or “open this attachment”). Others exploit vulnerabilities in software. Keep all your software patched, especially the most common and popular off-the-shelf products – they are the first ones a hacker will target.
  • 28. 3. Filter Executables Disguised as an invoice, an “urgent” document, or a notification that you’ve missed a delivery -- these are often hidden in ZIP archives. Make sure to filter those and executables in general. 4. Show File Extensions By allowing Windows to show file extensions, it makes it difficult for hackers to keep thier intentions hidden. For example, if a file is really called “Invoice.doc.exe,” then you shouldn’t allow it to present itself to the user as “Invoice.doc.”
  • 29. 5. Restrict User Privileges Keep incidents isolated by making sure one infected user does not bring down your entire network. By limiting machine access to only what it needs it can save your business significantly in downtime, allowing unaffected users/departments to continue working productively. 6. Disable Remote Desktop Protocol Hackers love to use Windows’ native remote access feature and third-party software to get malicious code onto computers. Although the remote desktop protocol is very useful, it does not need to be switched on all the time.
  • 30. 7. Get a Security Audit from a Reputable IT Consultant A credible and experienced IT Consultant, like Lantium, can assess your organization’s information systems, business processes, and overall cyber presence to help you identify methods to keep your business protected. By being proactive, you can ensure your business stays safe in 2017! Source: http://blog.lantium.com/seven-things-to-protect-your-business-from- ransomware
  • 31. The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security – with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals. Source : https://www.nomoreransom.org/about-the-project.html
  • 32. Ransomware Families and Types http://avien.net/blog/ransomware-resources/ransomware-families-and- types Analysis of the CryptoWall Version 4 Threat http://cyberthreatalliance.org/cryptowall-report.pdf Even the best antivirus likely can't save your files from a ransomware infection http://www.businessinsider.com/fighting-ransomware-with-antivirus-2016-1 Hewlett Packard Enterprise - Cyber Risk Report 2016 https://www.thehaguesecuritydelta.com/media/com_hsd/report/57/document/4aa6-3786enw.pdf Shoddy Programming causes new Ransomware to destroy your Data https://www.bleepingcomputer.com/news/security/shoddy-programming-causes-new-ransomware-to- destroy-your-data
  • 33. THANKS!Any questions? You can find me at …. tharindue.blogspot.com @thariyarox https://lk.linkedin.com/in/ediri ediri@live.com