SlideShare a Scribd company logo
1 of 27
Download to read offline
© 2016 N-able Technologies, ULC. All rights reserved.
RANSOMWARE
5 STEPS TO PROTECTING YOUR CUSTOMERS’ DATA
© 2016 N-able Technologies, ULC. All rights reserved.
WHAT IS RANSOMWARE?
A software based attack on your
network with the goal of
extortion.
© 2016 N-able Technologies, ULC. All rights reserved.
HOW DOES RANSOMWARE SPREAD?
Ransomware is typically
delivered through an exploit kit
or phishing attack.
© 2016 N-able Technologies, ULC. All rights reserved.
WHAT IS AN EXPLOIT KIT?
Code created to take advantage of
an unpatched or unknown system
vulnerability.
Example: Windows® OS, JavaScript® or
Adobe Reader®
© 2016 N-able Technologies, ULC. All rights reserved.
WHAT IS PHISHING?
Masquerading as a trustworthy entity
in an electronic communication with
malicious intent.
Example: Attachments to email.
Embedded links.
© 2016 N-able Technologies, ULC. All rights reserved.
“HOSTAGE” (NEW)
“COP” OR “LOCKER”
CRYPTOGRAPHIC
THREE RANSOMWARE VARIENTS
• Generally acquired from browsing something “naughty”; infects through JavaScript or Adobe Flash®
vulnerabilities. Prevents access to your underlying system without encryption.
• Appears to be from a federal agency and requests you pay a “fine” to compensate for your “illegal activity”.
• Generally acquired from phishing attacks. Encrypts data on your system and shares preventing access.
Demands a “fee” to unlock.
• Locked out of your data until you pay the ransom.
• E.g. “Cryptolocker” & “Locky”
• Generally acquired from phishing attacks, same underlying concept as cryptographic.
• Steals browser, chat history and contact lists, records video & audio. May threaten to send this info to your
contacts if a “fee” is not paid.
• E.g. “Crysis” & “Jigsaw”.
1
2
3
© 2016 N-able Technologies, ULC. All rights reserved.
THE PROGRESSION OF RANSOMWARE
1989
“Aids” Trojan on
floppy disk asks for
$189 to unlock a
file
2006
Gpcode, Archiveus,
Krotten, Cryzip,
TROJ.RNSOM.A,
and MayArchive
lock systems with
RSA encryption
algorithms
2012
“Reveton” informs
users they have
downloaded illegal
material and must
pay a “fine”
1
2013
“Cryptolocker”
appears using
nearly unbreakable
encryption, hard to
detect trojans and
ultimately includes
use of TOR network
for anonymity.
2014
“CryptoWall”
infects through
website
advertisements
2016
“Locky”, encrypts
all files with a .locky
extension and
demands fee to
unlock
2015
“Chimera” encrypts
files and threatens
to publish them
online if ransom is
not paid
2015
“CryptoWall” 3.0
and 4.0 add new
layers to their
encryption and
come packaged in
exploit kits
2016
RaaS (Ransomware
as a Service)
becomes possible
paving the way for
prolific growth.
© 2016 N-able Technologies, ULC. All rights reserved.
WHEN IS RANSOMWARE SUCCESSFUL?
To be considered successful, an attack
must:
1. Take control of a system or device.
2. Prevent access to the device and its data to some
degree.
3. Inform the user that the device is being held for
ransom along with a price and a method of payment.
4. Accept payment from the user.
5. Return full access to the device once payment is
received.*
*This does not always happen unfortunately.
© 2016 N-able Technologies, ULC. All rights reserved.
WHAT A COMPROMISED DEVICE LOOKS LIKE
All shapes and sizes:
1. Desktop background
2. Popup window
Demands:
1. Pay a small “fine” to regain access.
2. Pay a “fee” or lose your data.
3. Pay an increasing “fee” as time elapses.
4. Pay a “fee” or increments of your data
are destroyed over time.
5. Pay a “fee” or your personal
information is released to the public or
contact list.
© 2016 N-able Technologies, ULC. All rights reserved.
PROGRESSION OF A RANSOMWARE ATTACK
1. The ransomware trojan package is executed.
• Few operating systems are safe. Many current ransomware variants will work on
Windows, OS X and Linux® systems.
2. The trojan reaches out to one of many cloud servers to download its main
payload (commonly on the .TOR network, aka the “Dark web”).
3. Using the logged in user account, the trojan deletes itself, and the payload
begins to install and encrypt your files using military grade encoding.
Locations and files that are often targeted include:
• Locally stored office documents, image files, video files etc.
• Network shares the user has access to.
• Connected external drives such as USB thumb drives.
• Cloud storage that the user has write access to such as Dropbox®.
4. Volume Snapshot Services (VSS) or “Shadow Copies” are commonly deleted.
5. Wallpaper or screen overlay appears that alerts the user to the encryption
and instructs them to pay a “fine” or “fee”, often via BitCoin® - a virtually
untraceable online currency. Fees vary considerably.
6. Once paid, a public decryption key is returned and often data is restored.
© 2016 N-able Technologies, ULC. All rights reserved.
5 STEPS TO PROTECTING YOUR
CUSTOMERS’ DATA
© 2016 N-able Technologies, ULC. All rights reserved.
5 STEPS TO PROTECTING DATA
Access
Restrictions
Firewall &
Network
User
Education
Antimalware
Patch
Management
& Third Party
Vulnerability
Auditing
Backup &
Recovery
USERS PREVENTION RECOVERY OPTIONAL
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 1: USER EDUCATION
QUICK TIPS
Arm users with
the knowledge
they need to
recognize
threats and
avoid dangerous
behavior.
MINIMIZE IMPACT
PREVENTION
MINIMIZE IMPACT
• Majority of ransomware attacks rely on
social engineering (convincing the user
to initiate the interaction).
• Educate users to recognize and avoid
these attempts.
Common exploits:
• Macro’s in Microsoft® Office documents.
• JavaScript attachments in the form of fake documents.
• Embedded JavaScript in malicious websites.
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 1: USER EDUCATION
QUICK TIPS
Don’t enable
macros unless
you were
expecting them!
Block macros in
files from the
internet by
default in Active
Directory.
Use MS Office
viewers.
MINIMIZE IMPACT
PREVENTION
Macro’s in Microsoft Office® documents*:
1. An attachment arrives; when opened it appears encrypted.
2. Directions are put in the document to use the “Options” button and re-enable
macros.
3. Once the button is pressed, the ransomware infection begins.
*Allows for attack on Office 365® users as well!
PREVENTION
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 1: USER EDUCATION
QUICK TIPS
Unhide “known
extensions”.
Giving your users
visibility is key.
Antimalware's
Application
Control features
block Microsoft
WSH Cscript
and Microsoft
WSH WScript
MINIMIZE IMPACT
PREVENTION
MINIMIZE IMPACT
Javascript attachments in the form of fake documents:
1. An attachment arrives with what appears to be a Microsoft Office document or
compressed file attached (Windows hides known extensions).
2. The user clicks to open the document. The 834425.zip.JS file executes.
3. Once the file is executed, the ransomware infection begins.
PREVENTION
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 1: USER EDUCATION
QUICK TIPS
Block malicious
sites through
your Antivirus or
Firewall.
Sandbox web
access.
Configure
Windows to
open JavaScript
with Notepad.
MINIMIZE IMPACT
PREVENTION
Embedded JavaScript in malicious websites:
1. A user visits an infected page. It may be made to look like a legitimate organization.
2. Users typically click on a link, “play button” or other clickable object and
unknowingly execute the JavaScript.
3. Once the JavaScript is executed, the ransomware infection begins.
PREVENTION
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 2: ACCESS RESTRICTIONS
QUICK TIPS
Keep data stores
and shares
protected by
limiting the
number of users
who have
access.
MINIMIZE IMPACT
PREVENTION
MINIMIZE IMPACT
Ransomware typically executes under the
logged in account.
• Restrict users from backup shares and network
locations they do not need access to.
• Do not use Administrator accounts.. even for
administrators. Run As.. instead.
• Restrict Administrative accounts from using email.
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 3: ANTIMALWARE
QUICK TIPS
Advanced
Endpoint
protection is
required.
Intrusion
Detection
System.
Active Virus
Control aka a
Behavioral scan.
MINIMIZE IMPACT
PREVENTIONPREVENTION
Traditional signature based Antivirus is not
effective.
• AV must be capable of stopping processes that exhibit
malicious techniques (Heuristics/Behavioral & IDS)
• Implement inbound mail scanning and blocking.
• AV must be ON and up to date at all times. You will
need a way to monitor this.
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 4: PATCH MANAGEMENT
QUICK TIPS
Control patch
deployment
through a
centralized
system.
Enforce patch
installation and
reboots.
Discuss patching
policy with your
Customer!
MINIMIZE IMPACT
PREVENTIONPREVENTION
Unpatched systems are an open door for
ransomware delivery.
• Ensure your devices are patched and up to date.
• Apply patches no more than 30 days after they are
released from the vendor.
• Review your patching process to remove any
roadblocks such as reboot windows, and device
availability.
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 4: PATCH MANAGEMENT
QUICK TIPS
User’s often
ignore update
prompts for
these tools.
Take control of
the updates with
a Remote
Monitoring and
Management
solution such as
N-central®.
MINIMIZE IMPACT
PREVENTION
Third party applications must be patched.
• Don’t let applications such as Java® and Adobe Reader
get left out of your patch routine.
• These applications are some of the most common
entry points for exploit kits.
• Think carefully before deciding to leave older versions
of third party applications active.
PREVENTION
© 2016 N-able Technologies, ULC. All rights reserved.
STEP 5: BACKUP & RECOVERY
QUICK TIPS
Encrypt your
backup location.
Ransomware will
attempt to
access with the
user’s
permissions
Windows
shadow copies
are typically
deleted by
ransomware.
MINIMIZE IMPACT
PREVENTION
MINIMIZE IMPACT
Backup is the only hope for data recovery
beyond paying the ransom.
• Review your backup configuration, is it adequate?
• One of your backup locations must be offsite/cloud.
• Restrict access to your network backup stores.
• Validate that backups are happening and can be
restored.
© 2016 N-able Technologies, ULC. All rights reserved.
FIREWALL & NETWORK
QUICK TIPS
Advanced
technology can
help combat this
modern threat.
Keeping
workstations and
servers
segregated is
good practice.
MINIMIZE IMPACT
PREVENTIONPREVENTION
A strong firewall can be a significant
preventative measure.
Deploy a next generation firewall that:
• Will block threats based on a “threat feed”.
• Offers sandboxing.
• Can police user interactions with websites that are
not whitelisted (i.e. a “proceed?” query).
© 2016 N-able Technologies, ULC. All rights reserved.
VULNERABILITY ASSESSMENT
QUICK TIPS
Understanding
where you are
vulnerable is key
to impact
mitigation.
Restrict user
access to critical
data
MINIMIZE IMPACT
PREVENTION
MINIMIZE IMPACT
Know where your weak points are.
• Use a tool to frequently review your end-user access
rights and open exploits.
• Identify recurring problem areas and address them.
• Consider assessing your customers organization and
exploring data insurance with them.
© 2016 N-able Technologies, ULC. All rights reserved.
Ransomware is not just one of many
CYBERTHREATS
It’s a
GROWINGbusiness.
© 2016 N-able Technologies, ULC. All rights reserved.
Ransomware is an opportunity to
EDUCATE & INFORMyour users and supply the necessary
SERVICESfor business continuity.
© 2016 N-able Technologies, ULC. All rights reserved.
HELP USERS HELP THEMSELVES
QUICK TIPS
Remind and
inform your
users frequently.
Consider running
“red team”
attacks; spoofing
a ransomware
attempt as a
teaching tool.
MINIMIZE IMPACT
PREVENTION
MINIMIZE IMPACT
Ransomware Rescue infographic
variants available for download from
SolarWinds N-able:
http://offers.n-able.com/ransomware/
• Created to educate your users.
• English and Custom versions available.
• Links to blogs and this webinar.
© 2016 N-able Technologies, ULC. All rights reserved.
THANK YOU
The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, ULC. and its affiliates, are registered with the U.S. Patent and Trademark Office and
the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks,
registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are
trademarks or registered trademarks of their respective companies.

More Related Content

What's hot

Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Storage Switzerland
 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachGowling WLG
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionMohammad Yahya
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessKaspersky Lab
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessCalyptix Security
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceZubair Baig
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware AttackKeval Bhogayata
 

What's hot (20)

Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breach
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Ransomware
RansomwareRansomware
Ransomware
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT business
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware Attack
 

Viewers also liked

Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomSolarwinds N-able
 
The New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationThe New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationCode42
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
Ransomware : Sequestro De Dados Digitais
Ransomware : Sequestro De Dados DigitaisRansomware : Sequestro De Dados Digitais
Ransomware : Sequestro De Dados DigitaisMarcelo Lau
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
The New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationThe New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationCode42
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
 13 Ransomware Statistics That Will Make You Rethink Data Protection  13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection Worksighted
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationDarwish Ahmad
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data AnalyticsSymantec
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 

Viewers also liked (15)

Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
The New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationThe New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down Education
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Ransomware : Sequestro De Dados Digitais
Ransomware : Sequestro De Dados DigitaisRansomware : Sequestro De Dados Digitais
Ransomware : Sequestro De Dados Digitais
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
The New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationThe New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down Education
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
 13 Ransomware Statistics That Will Make You Rethink Data Protection  13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Ransomware - Friend or Foe
Ransomware - Friend or FoeRansomware - Friend or Foe
Ransomware - Friend or Foe
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 

Similar to How to Help Your Customers Protect Themselves from Ransomware Attacks

All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Saiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSASaiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSACarl Saiyed
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesDam Frank
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
SMB Guide-to-Ransomware
SMB Guide-to-RansomwareSMB Guide-to-Ransomware
SMB Guide-to-RansomwareDave Augustine
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information SecurityRachel Phillips
 
Ransomware - Rameez Shahzada
Ransomware - Rameez ShahzadaRansomware - Rameez Shahzada
Ransomware - Rameez ShahzadaRAMEEZ SHAHZADA
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docxjuliennehar
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...PaloAltoNetworks
 

Similar to How to Help Your Customers Protect Themselves from Ransomware Attacks (20)

All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Saiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSASaiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSA
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed Strategies
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
SMB Guide-to-Ransomware
SMB Guide-to-RansomwareSMB Guide-to-Ransomware
SMB Guide-to-Ransomware
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Ransomware
RansomwareRansomware
Ransomware
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Ransomware - Rameez Shahzada
Ransomware - Rameez ShahzadaRansomware - Rameez Shahzada
Ransomware - Rameez Shahzada
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 

More from Solarwinds N-able

5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service deliverySolarwinds N-able
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersSolarwinds N-able
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencySolarwinds N-able
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilitySolarwinds N-able
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPsSolarwinds N-able
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinarSolarwinds N-able
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business managementSolarwinds N-able
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report ManagerSolarwinds N-able
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Solarwinds N-able
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsSolarwinds N-able
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptxSolarwinds N-able
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationSolarwinds N-able
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch managementSolarwinds N-able
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralSolarwinds N-able
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customersSolarwinds N-able
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingSolarwinds N-able
 

More from Solarwinds N-able (20)

5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery
 
MSP Business Plan in a Box
MSP Business Plan in a BoxMSP Business Plan in a Box
MSP Business Plan in a Box
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales Producers
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP Profitability
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinar
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business management
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report Manager
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
 
MSP Manager Launch Webinar
MSP Manager Launch WebinarMSP Manager Launch Webinar
MSP Manager Launch Webinar
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
 
Social Media for the MSP
Social Media for the MSPSocial Media for the MSP
Social Media for the MSP
 
5 challenges infographic
5 challenges infographic5 challenges infographic
5 challenges infographic
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-central
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reporting
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

How to Help Your Customers Protect Themselves from Ransomware Attacks

  • 1. © 2016 N-able Technologies, ULC. All rights reserved. RANSOMWARE 5 STEPS TO PROTECTING YOUR CUSTOMERS’ DATA
  • 2. © 2016 N-able Technologies, ULC. All rights reserved. WHAT IS RANSOMWARE? A software based attack on your network with the goal of extortion.
  • 3. © 2016 N-able Technologies, ULC. All rights reserved. HOW DOES RANSOMWARE SPREAD? Ransomware is typically delivered through an exploit kit or phishing attack.
  • 4. © 2016 N-able Technologies, ULC. All rights reserved. WHAT IS AN EXPLOIT KIT? Code created to take advantage of an unpatched or unknown system vulnerability. Example: Windows® OS, JavaScript® or Adobe Reader®
  • 5. © 2016 N-able Technologies, ULC. All rights reserved. WHAT IS PHISHING? Masquerading as a trustworthy entity in an electronic communication with malicious intent. Example: Attachments to email. Embedded links.
  • 6. © 2016 N-able Technologies, ULC. All rights reserved. “HOSTAGE” (NEW) “COP” OR “LOCKER” CRYPTOGRAPHIC THREE RANSOMWARE VARIENTS • Generally acquired from browsing something “naughty”; infects through JavaScript or Adobe Flash® vulnerabilities. Prevents access to your underlying system without encryption. • Appears to be from a federal agency and requests you pay a “fine” to compensate for your “illegal activity”. • Generally acquired from phishing attacks. Encrypts data on your system and shares preventing access. Demands a “fee” to unlock. • Locked out of your data until you pay the ransom. • E.g. “Cryptolocker” & “Locky” • Generally acquired from phishing attacks, same underlying concept as cryptographic. • Steals browser, chat history and contact lists, records video & audio. May threaten to send this info to your contacts if a “fee” is not paid. • E.g. “Crysis” & “Jigsaw”. 1 2 3
  • 7. © 2016 N-able Technologies, ULC. All rights reserved. THE PROGRESSION OF RANSOMWARE 1989 “Aids” Trojan on floppy disk asks for $189 to unlock a file 2006 Gpcode, Archiveus, Krotten, Cryzip, TROJ.RNSOM.A, and MayArchive lock systems with RSA encryption algorithms 2012 “Reveton” informs users they have downloaded illegal material and must pay a “fine” 1 2013 “Cryptolocker” appears using nearly unbreakable encryption, hard to detect trojans and ultimately includes use of TOR network for anonymity. 2014 “CryptoWall” infects through website advertisements 2016 “Locky”, encrypts all files with a .locky extension and demands fee to unlock 2015 “Chimera” encrypts files and threatens to publish them online if ransom is not paid 2015 “CryptoWall” 3.0 and 4.0 add new layers to their encryption and come packaged in exploit kits 2016 RaaS (Ransomware as a Service) becomes possible paving the way for prolific growth.
  • 8. © 2016 N-able Technologies, ULC. All rights reserved. WHEN IS RANSOMWARE SUCCESSFUL? To be considered successful, an attack must: 1. Take control of a system or device. 2. Prevent access to the device and its data to some degree. 3. Inform the user that the device is being held for ransom along with a price and a method of payment. 4. Accept payment from the user. 5. Return full access to the device once payment is received.* *This does not always happen unfortunately.
  • 9. © 2016 N-able Technologies, ULC. All rights reserved. WHAT A COMPROMISED DEVICE LOOKS LIKE All shapes and sizes: 1. Desktop background 2. Popup window Demands: 1. Pay a small “fine” to regain access. 2. Pay a “fee” or lose your data. 3. Pay an increasing “fee” as time elapses. 4. Pay a “fee” or increments of your data are destroyed over time. 5. Pay a “fee” or your personal information is released to the public or contact list.
  • 10. © 2016 N-able Technologies, ULC. All rights reserved. PROGRESSION OF A RANSOMWARE ATTACK 1. The ransomware trojan package is executed. • Few operating systems are safe. Many current ransomware variants will work on Windows, OS X and Linux® systems. 2. The trojan reaches out to one of many cloud servers to download its main payload (commonly on the .TOR network, aka the “Dark web”). 3. Using the logged in user account, the trojan deletes itself, and the payload begins to install and encrypt your files using military grade encoding. Locations and files that are often targeted include: • Locally stored office documents, image files, video files etc. • Network shares the user has access to. • Connected external drives such as USB thumb drives. • Cloud storage that the user has write access to such as Dropbox®. 4. Volume Snapshot Services (VSS) or “Shadow Copies” are commonly deleted. 5. Wallpaper or screen overlay appears that alerts the user to the encryption and instructs them to pay a “fine” or “fee”, often via BitCoin® - a virtually untraceable online currency. Fees vary considerably. 6. Once paid, a public decryption key is returned and often data is restored.
  • 11. © 2016 N-able Technologies, ULC. All rights reserved. 5 STEPS TO PROTECTING YOUR CUSTOMERS’ DATA
  • 12. © 2016 N-able Technologies, ULC. All rights reserved. 5 STEPS TO PROTECTING DATA Access Restrictions Firewall & Network User Education Antimalware Patch Management & Third Party Vulnerability Auditing Backup & Recovery USERS PREVENTION RECOVERY OPTIONAL
  • 13. © 2016 N-able Technologies, ULC. All rights reserved. STEP 1: USER EDUCATION QUICK TIPS Arm users with the knowledge they need to recognize threats and avoid dangerous behavior. MINIMIZE IMPACT PREVENTION MINIMIZE IMPACT • Majority of ransomware attacks rely on social engineering (convincing the user to initiate the interaction). • Educate users to recognize and avoid these attempts. Common exploits: • Macro’s in Microsoft® Office documents. • JavaScript attachments in the form of fake documents. • Embedded JavaScript in malicious websites.
  • 14. © 2016 N-able Technologies, ULC. All rights reserved. STEP 1: USER EDUCATION QUICK TIPS Don’t enable macros unless you were expecting them! Block macros in files from the internet by default in Active Directory. Use MS Office viewers. MINIMIZE IMPACT PREVENTION Macro’s in Microsoft Office® documents*: 1. An attachment arrives; when opened it appears encrypted. 2. Directions are put in the document to use the “Options” button and re-enable macros. 3. Once the button is pressed, the ransomware infection begins. *Allows for attack on Office 365® users as well! PREVENTION
  • 15. © 2016 N-able Technologies, ULC. All rights reserved. STEP 1: USER EDUCATION QUICK TIPS Unhide “known extensions”. Giving your users visibility is key. Antimalware's Application Control features block Microsoft WSH Cscript and Microsoft WSH WScript MINIMIZE IMPACT PREVENTION MINIMIZE IMPACT Javascript attachments in the form of fake documents: 1. An attachment arrives with what appears to be a Microsoft Office document or compressed file attached (Windows hides known extensions). 2. The user clicks to open the document. The 834425.zip.JS file executes. 3. Once the file is executed, the ransomware infection begins. PREVENTION
  • 16. © 2016 N-able Technologies, ULC. All rights reserved. STEP 1: USER EDUCATION QUICK TIPS Block malicious sites through your Antivirus or Firewall. Sandbox web access. Configure Windows to open JavaScript with Notepad. MINIMIZE IMPACT PREVENTION Embedded JavaScript in malicious websites: 1. A user visits an infected page. It may be made to look like a legitimate organization. 2. Users typically click on a link, “play button” or other clickable object and unknowingly execute the JavaScript. 3. Once the JavaScript is executed, the ransomware infection begins. PREVENTION
  • 17. © 2016 N-able Technologies, ULC. All rights reserved. STEP 2: ACCESS RESTRICTIONS QUICK TIPS Keep data stores and shares protected by limiting the number of users who have access. MINIMIZE IMPACT PREVENTION MINIMIZE IMPACT Ransomware typically executes under the logged in account. • Restrict users from backup shares and network locations they do not need access to. • Do not use Administrator accounts.. even for administrators. Run As.. instead. • Restrict Administrative accounts from using email.
  • 18. © 2016 N-able Technologies, ULC. All rights reserved. STEP 3: ANTIMALWARE QUICK TIPS Advanced Endpoint protection is required. Intrusion Detection System. Active Virus Control aka a Behavioral scan. MINIMIZE IMPACT PREVENTIONPREVENTION Traditional signature based Antivirus is not effective. • AV must be capable of stopping processes that exhibit malicious techniques (Heuristics/Behavioral & IDS) • Implement inbound mail scanning and blocking. • AV must be ON and up to date at all times. You will need a way to monitor this.
  • 19. © 2016 N-able Technologies, ULC. All rights reserved. STEP 4: PATCH MANAGEMENT QUICK TIPS Control patch deployment through a centralized system. Enforce patch installation and reboots. Discuss patching policy with your Customer! MINIMIZE IMPACT PREVENTIONPREVENTION Unpatched systems are an open door for ransomware delivery. • Ensure your devices are patched and up to date. • Apply patches no more than 30 days after they are released from the vendor. • Review your patching process to remove any roadblocks such as reboot windows, and device availability.
  • 20. © 2016 N-able Technologies, ULC. All rights reserved. STEP 4: PATCH MANAGEMENT QUICK TIPS User’s often ignore update prompts for these tools. Take control of the updates with a Remote Monitoring and Management solution such as N-central®. MINIMIZE IMPACT PREVENTION Third party applications must be patched. • Don’t let applications such as Java® and Adobe Reader get left out of your patch routine. • These applications are some of the most common entry points for exploit kits. • Think carefully before deciding to leave older versions of third party applications active. PREVENTION
  • 21. © 2016 N-able Technologies, ULC. All rights reserved. STEP 5: BACKUP & RECOVERY QUICK TIPS Encrypt your backup location. Ransomware will attempt to access with the user’s permissions Windows shadow copies are typically deleted by ransomware. MINIMIZE IMPACT PREVENTION MINIMIZE IMPACT Backup is the only hope for data recovery beyond paying the ransom. • Review your backup configuration, is it adequate? • One of your backup locations must be offsite/cloud. • Restrict access to your network backup stores. • Validate that backups are happening and can be restored.
  • 22. © 2016 N-able Technologies, ULC. All rights reserved. FIREWALL & NETWORK QUICK TIPS Advanced technology can help combat this modern threat. Keeping workstations and servers segregated is good practice. MINIMIZE IMPACT PREVENTIONPREVENTION A strong firewall can be a significant preventative measure. Deploy a next generation firewall that: • Will block threats based on a “threat feed”. • Offers sandboxing. • Can police user interactions with websites that are not whitelisted (i.e. a “proceed?” query).
  • 23. © 2016 N-able Technologies, ULC. All rights reserved. VULNERABILITY ASSESSMENT QUICK TIPS Understanding where you are vulnerable is key to impact mitigation. Restrict user access to critical data MINIMIZE IMPACT PREVENTION MINIMIZE IMPACT Know where your weak points are. • Use a tool to frequently review your end-user access rights and open exploits. • Identify recurring problem areas and address them. • Consider assessing your customers organization and exploring data insurance with them.
  • 24. © 2016 N-able Technologies, ULC. All rights reserved. Ransomware is not just one of many CYBERTHREATS It’s a GROWINGbusiness.
  • 25. © 2016 N-able Technologies, ULC. All rights reserved. Ransomware is an opportunity to EDUCATE & INFORMyour users and supply the necessary SERVICESfor business continuity.
  • 26. © 2016 N-able Technologies, ULC. All rights reserved. HELP USERS HELP THEMSELVES QUICK TIPS Remind and inform your users frequently. Consider running “red team” attacks; spoofing a ransomware attempt as a teaching tool. MINIMIZE IMPACT PREVENTION MINIMIZE IMPACT Ransomware Rescue infographic variants available for download from SolarWinds N-able: http://offers.n-able.com/ransomware/ • Created to educate your users. • English and Custom versions available. • Links to blogs and this webinar.
  • 27. © 2016 N-able Technologies, ULC. All rights reserved. THANK YOU The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, ULC. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies.