SlideShare a Scribd company logo
1 of 7
HOW TO SPOT A RANSOMWARE EMAIL
Ransomware is a form of
malware that takes over your
computer, denying access to
your data, and demanding a
ransom payment in exchange
for its recovery.
The most common delivery
methods for this attack are
hyperlinks and attachments,
usually found in phishing
emails.
1. Check Email Addresses
The display name might look authentic, but
email addresses are much harder to falsify.
With many companies purchasing their own
domain names, attackers often have to alter
the spelling slightly – in our example you can
see that the letter L in the Apple domain has
been replaced, instead showing ‘appie’.
2. Suspicious Attachments
If an email from a supposed service
provider includes an attachment be
wary – this is not common practice,
with most companies offering
important information in the message
itself or on a web page.
3. Inspect Before Clicking
If an email from an unknown
source includes a hyperlink, it is
best to avoid clicking it all
together. However, if you think
the message may be legitimate,
just hover over the link before
clicking it to reveal the URL it
directs to.
Most fraudulent URLs will just be
a random collection of letters and
symbols, or – like our example –
will try to alter the spelling of the
genuine website slightly.
4. Scare-tactics
Ransowmare often hides within
phishing emails, which typically
use fear to manipulate their
targets, as opposed to other
attacks which may offer a
reward or service.
The constructed narrative will
usually involve an account
breach, or – like our example –
an unapproved transaction or
fine.
For more topics and training material visit the Boxphish website.

More Related Content

Similar to Apple Ransomware Slides

CEO Fraud Slides
CEO Fraud SlidesCEO Fraud Slides
CEO Fraud SlidesAltinetLtd
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Debenhams Social Engineering Slides
Debenhams Social Engineering SlidesDebenhams Social Engineering Slides
Debenhams Social Engineering SlidesAltinetLtd
 
Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
Email marketing terms
Email marketing termsEmail marketing terms
Email marketing termsxerprintec
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam FolderMyStockAlarm
 
5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing Email5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing EmailChris Roche
 
R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06Ralph Paglia
 
Ralph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess MagazineRalph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess MagazineRalph Paglia
 
R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006Ralph Paglia
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquettebtanwar74
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquetteNamita Singh
 

Similar to Apple Ransomware Slides (20)

CEO Fraud Slides
CEO Fraud SlidesCEO Fraud Slides
CEO Fraud Slides
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Debenhams Social Engineering Slides
Debenhams Social Engineering SlidesDebenhams Social Engineering Slides
Debenhams Social Engineering Slides
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Final paper
Final paperFinal paper
Final paper
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Email marketing terms
Email marketing termsEmail marketing terms
Email marketing terms
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam Folder
 
5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing Email5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing Email
 
R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06R Paglia Spam Filters Auto Success Nov06
R Paglia Spam Filters Auto Success Nov06
 
Ralph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess MagazineRalph Paglia on Spam Filters in AutoSuccess Magazine
Ralph Paglia on Spam Filters in AutoSuccess Magazine
 
R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006R Paglia Auto Success Nov 2006
R Paglia Auto Success Nov 2006
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 
23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette23 rules of_corporate_email_etiquette
23 rules of_corporate_email_etiquette
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Apple Ransomware Slides

  • 1. HOW TO SPOT A RANSOMWARE EMAIL
  • 2. Ransomware is a form of malware that takes over your computer, denying access to your data, and demanding a ransom payment in exchange for its recovery. The most common delivery methods for this attack are hyperlinks and attachments, usually found in phishing emails.
  • 3. 1. Check Email Addresses The display name might look authentic, but email addresses are much harder to falsify. With many companies purchasing their own domain names, attackers often have to alter the spelling slightly – in our example you can see that the letter L in the Apple domain has been replaced, instead showing ‘appie’.
  • 4. 2. Suspicious Attachments If an email from a supposed service provider includes an attachment be wary – this is not common practice, with most companies offering important information in the message itself or on a web page.
  • 5. 3. Inspect Before Clicking If an email from an unknown source includes a hyperlink, it is best to avoid clicking it all together. However, if you think the message may be legitimate, just hover over the link before clicking it to reveal the URL it directs to. Most fraudulent URLs will just be a random collection of letters and symbols, or – like our example – will try to alter the spelling of the genuine website slightly.
  • 6. 4. Scare-tactics Ransowmare often hides within phishing emails, which typically use fear to manipulate their targets, as opposed to other attacks which may offer a reward or service. The constructed narrative will usually involve an account breach, or – like our example – an unapproved transaction or fine.
  • 7. For more topics and training material visit the Boxphish website.