SlideShare a Scribd company logo
6 Interesting Things to
Know about Bad Rabbit
Ransomware
Major Affected Countries
RUSSIA UKRAINE
GERMANY TURKEY
Presents a “Countdown Timer”
How it Spreads?
It is distributed via a bogus Adobe Flash update
Visitors to compromised websites are told to install a Flash update
No exploits are used
It can spread laterally across
networks...
The SMB component allows it to move
laterally across an infected network and
propagate without user interaction
Reference of “Game of Thrones”
The code contains
references to Viserion,
Drogon, and Rhaegal-
the dragons featured in
the “Game of Thrones”.
The culprit is Still Unknown
THANK YOU!
For more info, visit – http://bit.ly/2yRTGlp

More Related Content

More from kanika sharma

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing
kanika sharma
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketing
kanika sharma
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?
kanika sharma
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
kanika sharma
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Password
kanika sharma
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME's
kanika sharma
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
kanika sharma
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computer
kanika sharma
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?
kanika sharma
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
kanika sharma
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile users
kanika sharma
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
kanika sharma
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
kanika sharma
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel items
kanika sharma
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –
kanika sharma
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11
kanika sharma
 
Device security Tips
Device security TipsDevice security Tips
Device security Tips
kanika sharma
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
kanika sharma
 
What is cyber crime
What is cyber crimeWhat is cyber crime
What is cyber crime
kanika sharma
 

More from kanika sharma (20)

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketing
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Password
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME's
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computer
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile users
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel items
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11
 
Device security Tips
Device security TipsDevice security Tips
Device security Tips
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
 
What is cyber crime
What is cyber crimeWhat is cyber crime
What is cyber crime
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

6 interesting things to know about Bad Rabbit Ransomware