SlideShare a Scribd company logo
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
CryptoTrap Defeats
Ransomware
Quick Summary
socialnews@trapx.com
September 4, 2016
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•We’re pleased to announce the release of CryptoTrap™, a new tool aimed at
helping enterprises detect and combat a rising tide of sophisticated
ransomware attacks.
•The CryptoTrap tool uses deception technology to deceive attackers and lure
them away from an organization’s valuable assets, giving enterprises the
ability to detect and remediate ransomware threats before they can further
compromise the network and harm critical data.
•CryptoTrap enables your security operations team to strike back at
ransomware and take the initiative in defeating the cyber attackers.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•Industry news shows us that ransomware attacks are accelerating in every
industry.
•According to the FBI, ransomware victims paid attackers a total of $209
million in the first quarter of 2016.
•The producers of the CryptoWall ransomware attack generated ransom of
more than $300 million in 2015 alone.
•These trends are expected to continue and accelerate over the next few
years.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•Ransomware, plain and simple, is criminal extortion.
•It brings cost in the form of ransom payments, and perhaps even worse, the
disruption to your business operations.
•Ransomware is also unpredictable - cyber criminals and organized crime
cannot be counted on to do what they say. They can take the ransom money
and still permanently remove or damage critical corporate information.
•The only reliable defense for your security operations team is to present a
strong offense using tools like CryptoTrap.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•In highly regulated industries, such as healthcare, ransomware can bring the
liability associated with a data breach which usually results in audits, penalties
and potential litigation.
•Note that Health and Human Services OCR published commentary in July
that they view a ransomware attack as a data breach under HIPAA.
•Your HIPAA risk analysis will need to address ransomware and you must
have a solution to prevent it and to speed recovery.
•It seems obvious yet most hospitals have missed this completely. Most
hospitals do not address ransomware directly if at all in their risk analysis.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•Ransom extortion payments aside, the cost to a hospital of not being able to
utilize x-ray and MRI machines for even one day can be many tens of
thousands of dollars.
•The problem is even more difficult for independent MRI/CT-scan and XRAY
centers, surgical centers, skilled nursing facilities (SNFs), large physician
practices and diagnostic laboratories which may have smaller security teams.
•In fact, many may never be able to recover their data.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•Retail, finance and banking and many other industries remain active targets
of ransomware.
•In retail earlier this year ransomware was customized to seek out and find
targeted ecommerce systems, take over the entire website using targeted
exploits, encrypt the data and then display a ransom warning on the
homepage.
•Around the globe banks continue to be hit repeatedly with ransomware.
•The US Federal Financial Institutions Examination Council (FFIEC) warned
banks earlier this year about a continued rise in cyber-attacks using
ransomware. The FFIEC noted the increase in both the number and severity
of attacks against financial institutions that involve extortion.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•Leveraging TrapX’s deception technology, CryptoTrap is able to stop
ransomware in its tracks by tricking attackers who are attempting to encrypt
real network data.
•TrapX’s DeceptionTokens (lures) divert network-based ransomware attacks
towards TrapX specialized ransomware traps designed to isolate the threat
and keep it captive while protecting the organization’s real files.
•The TrapX ransomware traps alert security teams to the presence of the
ransomware immediately, while the source of the attack is isolated and
disconnected from the network, stopping the attack in its tracks.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•TrapX researchers have identified more than 2,000 variations of ransomware
that employ different methods of attack on network shares.
•To address this challenge, CryptoTrap is designed to ensure customers are
protected from all of these methods—thus setting it apart from other
ransomware tools.
•CryptoTrap is also setting an industry first by holding ransomware attacks
“hostage” by leveraging deception technology, while security teams are
alerted to remediate the threat.
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
•CryptoTrap is a member of the TrapX family of products. You can upgrade
CryptoTrap to add the power of DeceptionGrid to protect your enterprise from
the most sophisticated cyber attackers and the tools they use.
•Our website: http://www.trapx.com
•CryptoTrap available free to the public as a 30 day trial. Check it out here:
http://deceive.trapx.com/WebInquiry-CryptoTrapRequest_2
•You can see the TrapX press release on CryptoTrap here:
http://trapx.com/trapx-combats-ransomware-attacks-with-new-cryptotrap-tool/
•More information on ransomware can be found on the FBI website:
https://www.fbi.gov/news/stories/incidents-of-ransomware-on-the-rise
•Check out the wikipedia page on ransomware here:
https://en.wikipedia.org/wiki/Ransomware
CryptoTrap Defeats Ransomware
DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
© TrapX, Inc. Proprietary and Confidential. All rights reserved.
| ‹#›
Copyright © 2016 by TrapX Security
All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or
mechanical methods, without the prior written permission of TrapX Security.
Thank You

More Related Content

What's hot

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
Cyren, Inc
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
ClearDATACloud
 
INtroduction to Zagros!
INtroduction to Zagros!INtroduction to Zagros!
INtroduction to Zagros!
Gita Ziabari
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
CrowdStrike
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
Noel Waterman
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
Sarah Roberts
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
CrowdStrike
 
(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases
Priyanka Aash
 
The Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRThe Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDR
Netpluz Asia Pte Ltd
 
Fraud management in cloud simulation
Fraud management in cloud simulationFraud management in cloud simulation
Fraud management in cloud simulation
Syniverse
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
NCCOMMS
 
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
ThreatConnect
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
FireEye, Inc.
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New Scope
ThreatConnect
 
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
CrowdStrike
 
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
CrowdStrike
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
CrowdStrike
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike
 
Retail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry ExpertsRetail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry Experts
Tripwire
 

What's hot (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
INtroduction to Zagros!
INtroduction to Zagros!INtroduction to Zagros!
INtroduction to Zagros!
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
 
(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases
 
The Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDRThe Best Just Got Better, Intercept X Now With EDR
The Best Just Got Better, Intercept X Now With EDR
 
Fraud management in cloud simulation
Fraud management in cloud simulationFraud management in cloud simulation
Fraud management in cloud simulation
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New Scope
 
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
 
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop ThemUnderstanding Fileless (or Non-Malware) Attacks and How to Stop Them
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
 
Retail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry ExpertsRetail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry Experts
 

Viewers also liked

Oman take over and acquisition regulation
Oman take over and acquisition regulationOman take over and acquisition regulation
Oman take over and acquisition regulation
Al Alawi and Co Advocates Legal Consultants
 
Taking pefecting enforcing security 20 01 16 - part 2
Taking pefecting  enforcing security   20 01 16 - part 2Taking pefecting  enforcing security   20 01 16 - part 2
Taking pefecting enforcing security 20 01 16 - part 2
Al Alawi and Co Advocates Legal Consultants
 
Oman Take Over and Acquisition Regulation - Part 1
Oman Take Over and Acquisition Regulation - Part 1Oman Take Over and Acquisition Regulation - Part 1
Oman Take Over and Acquisition Regulation - Part 1
Al Alawi and Co Advocates Legal Consultants
 
Taking, Perfecting, and Enforcing Security in Oman - Part 2
Taking, Perfecting, and Enforcing Security in Oman - Part 2Taking, Perfecting, and Enforcing Security in Oman - Part 2
Taking, Perfecting, and Enforcing Security in Oman - Part 2
Al Alawi and Co Advocates Legal Consultants
 
Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1
Al Alawi and Co Advocates Legal Consultants
 
CV UPDATE17-11-2015
CV UPDATE17-11-2015CV UPDATE17-11-2015
CV UPDATE17-11-2015
DEVARAJ B C
 
Marketing tradicional m.digital
Marketing tradicional m.digitalMarketing tradicional m.digital
Marketing tradicional m.digital
Patricia_Guaman_Gualli
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
Milad Kiaee
 
Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1
Al Alawi and Co Advocates Legal Consultants
 
Acidente radiativo gamagrafia-perú
Acidente radiativo gamagrafia-perúAcidente radiativo gamagrafia-perú
Acidente radiativo gamagrafia-perú
Ricardo Ramalho
 

Viewers also liked (10)

Oman take over and acquisition regulation
Oman take over and acquisition regulationOman take over and acquisition regulation
Oman take over and acquisition regulation
 
Taking pefecting enforcing security 20 01 16 - part 2
Taking pefecting  enforcing security   20 01 16 - part 2Taking pefecting  enforcing security   20 01 16 - part 2
Taking pefecting enforcing security 20 01 16 - part 2
 
Oman Take Over and Acquisition Regulation - Part 1
Oman Take Over and Acquisition Regulation - Part 1Oman Take Over and Acquisition Regulation - Part 1
Oman Take Over and Acquisition Regulation - Part 1
 
Taking, Perfecting, and Enforcing Security in Oman - Part 2
Taking, Perfecting, and Enforcing Security in Oman - Part 2Taking, Perfecting, and Enforcing Security in Oman - Part 2
Taking, Perfecting, and Enforcing Security in Oman - Part 2
 
Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1
 
CV UPDATE17-11-2015
CV UPDATE17-11-2015CV UPDATE17-11-2015
CV UPDATE17-11-2015
 
Marketing tradicional m.digital
Marketing tradicional m.digitalMarketing tradicional m.digital
Marketing tradicional m.digital
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
 
Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1Taking Perfecting and Enforcing Security In Oman - Part 1
Taking Perfecting and Enforcing Security In Oman - Part 1
 
Acidente radiativo gamagrafia-perú
Acidente radiativo gamagrafia-perúAcidente radiativo gamagrafia-perú
Acidente radiativo gamagrafia-perú
 

Similar to Crypto trap for social media 9.4.2016

Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets
Digital Transformation EXPO Event Series
 
Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)
Evan Clark
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
Infosectrain3
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
Tony Zirnoon, CISSP
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sg
Christopher R. Ward
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client Alert
Robyn Melnyk
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
IBM Security
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_Devices
Tony Zirnoon, CISSP
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
Morakinyo Animasaun
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Innovation Network Technologies: InNet
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware Attacks
Emily Brown
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Security
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
Cyphort
 
What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
Zscaler
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
Scott Zimmerman
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 

Similar to Crypto trap for social media 9.4.2016 (20)

Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets
 
Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sg
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client Alert
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_Devices
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware Attacks
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 

Recently uploaded

UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 

Recently uploaded (20)

UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 

Crypto trap for social media 9.4.2016

  • 1. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› CryptoTrap Defeats Ransomware Quick Summary socialnews@trapx.com September 4, 2016
  • 2. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •We’re pleased to announce the release of CryptoTrap™, a new tool aimed at helping enterprises detect and combat a rising tide of sophisticated ransomware attacks. •The CryptoTrap tool uses deception technology to deceive attackers and lure them away from an organization’s valuable assets, giving enterprises the ability to detect and remediate ransomware threats before they can further compromise the network and harm critical data. •CryptoTrap enables your security operations team to strike back at ransomware and take the initiative in defeating the cyber attackers. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 3. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •Industry news shows us that ransomware attacks are accelerating in every industry. •According to the FBI, ransomware victims paid attackers a total of $209 million in the first quarter of 2016. •The producers of the CryptoWall ransomware attack generated ransom of more than $300 million in 2015 alone. •These trends are expected to continue and accelerate over the next few years. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 4. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •Ransomware, plain and simple, is criminal extortion. •It brings cost in the form of ransom payments, and perhaps even worse, the disruption to your business operations. •Ransomware is also unpredictable - cyber criminals and organized crime cannot be counted on to do what they say. They can take the ransom money and still permanently remove or damage critical corporate information. •The only reliable defense for your security operations team is to present a strong offense using tools like CryptoTrap. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 5. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •In highly regulated industries, such as healthcare, ransomware can bring the liability associated with a data breach which usually results in audits, penalties and potential litigation. •Note that Health and Human Services OCR published commentary in July that they view a ransomware attack as a data breach under HIPAA. •Your HIPAA risk analysis will need to address ransomware and you must have a solution to prevent it and to speed recovery. •It seems obvious yet most hospitals have missed this completely. Most hospitals do not address ransomware directly if at all in their risk analysis. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 6. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •Ransom extortion payments aside, the cost to a hospital of not being able to utilize x-ray and MRI machines for even one day can be many tens of thousands of dollars. •The problem is even more difficult for independent MRI/CT-scan and XRAY centers, surgical centers, skilled nursing facilities (SNFs), large physician practices and diagnostic laboratories which may have smaller security teams. •In fact, many may never be able to recover their data. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 7. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •Retail, finance and banking and many other industries remain active targets of ransomware. •In retail earlier this year ransomware was customized to seek out and find targeted ecommerce systems, take over the entire website using targeted exploits, encrypt the data and then display a ransom warning on the homepage. •Around the globe banks continue to be hit repeatedly with ransomware. •The US Federal Financial Institutions Examination Council (FFIEC) warned banks earlier this year about a continued rise in cyber-attacks using ransomware. The FFIEC noted the increase in both the number and severity of attacks against financial institutions that involve extortion. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 8. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •Leveraging TrapX’s deception technology, CryptoTrap is able to stop ransomware in its tracks by tricking attackers who are attempting to encrypt real network data. •TrapX’s DeceptionTokens (lures) divert network-based ransomware attacks towards TrapX specialized ransomware traps designed to isolate the threat and keep it captive while protecting the organization’s real files. •The TrapX ransomware traps alert security teams to the presence of the ransomware immediately, while the source of the attack is isolated and disconnected from the network, stopping the attack in its tracks. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 9. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •TrapX researchers have identified more than 2,000 variations of ransomware that employ different methods of attack on network shares. •To address this challenge, CryptoTrap is designed to ensure customers are protected from all of these methods—thus setting it apart from other ransomware tools. •CryptoTrap is also setting an industry first by holding ransomware attacks “hostage” by leveraging deception technology, while security teams are alerted to remediate the threat. CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 10. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› •CryptoTrap is a member of the TrapX family of products. You can upgrade CryptoTrap to add the power of DeceptionGrid to protect your enterprise from the most sophisticated cyber attackers and the tools they use. •Our website: http://www.trapx.com •CryptoTrap available free to the public as a 30 day trial. Check it out here: http://deceive.trapx.com/WebInquiry-CryptoTrapRequest_2 •You can see the TrapX press release on CryptoTrap here: http://trapx.com/trapx-combats-ransomware-attacks-with-new-cryptotrap-tool/ •More information on ransomware can be found on the FBI website: https://www.fbi.gov/news/stories/incidents-of-ransomware-on-the-rise •Check out the wikipedia page on ransomware here: https://en.wikipedia.org/wiki/Ransomware CryptoTrap Defeats Ransomware DECEIVE | DETECT | DEFENDCopyright TrapX Security - 2016 - All Rights Reserved.
  • 11. © TrapX, Inc. Proprietary and Confidential. All rights reserved. | ‹#› Copyright © 2016 by TrapX Security All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of TrapX Security. Thank You