SlideShare a Scribd company logo
Practical
Security Guide
to Prevent Cyber Extortion
2
European organizations are the
ones that suffer the highest
number of sensitive data theft.
The outlook for 2016 is that Europe will continue to be at risk of
cyberattacks.
91% of SMEs have been
targets of IT attacks
Source: Shopper Software Security in SMBs. Nielsen, April 2015
Ignoring malware
attacks is a risk not
worth taking.
Panda presents you with advice to keep your company safe and
your mind at ease.
4
What is Cyber
Extortion?
5
Cyber extortion is a form of
blackmail in which victims of
an IT attack are forced to pay
to avoid its effects.
One of the most widespread methods of cyber extortion is
ransomware. This attack encrypts the victim’s information
and then demands a ransom in order for the information to be
decrypted and returned.
Once involved in the blackmail, having paid the ransom
demanded by the cybercriminal, the victim of a cyber extortion
usually receives an email with the code to decrypt their
information. The method of payment is usually Bitcoin, a digital
currency that can be exchanged for real money (1 Bitcoin =
$380). In fact, they usually use this payment method to hamper
its traceability. However, the payment doesn’t guarantee that the
business won’t be attacked again in the future.
Other similar attacks that use this kind of extortion are ones
which infect your computer and access its webcam, then
blackmail you so that they do not spread the videos.
The majority of attacks start with emails that include attached
documents or by visiting unsecure websites.
39%
Unsafe and fraudulent websites
23%
Software download
19%
Malware received by email
Sources of Infection
Source: Shopper Software Security in SMBs. Nielsen, April 2015
6
How do cybercriminals
use ransomware for
attacks?
7
Ransomware such as
Cryptolocker, Cyptowall, or
Coinvault threaten the integrity
of files that are found on the
computer or network drives that
they have access to.
The malware encrypts the data so that it can only be decrypted
using a key that the cybercriminals will hand over if the business
pays the requested ransom.
If you are one of the companies affected by ransomware then
you usually have between 48 and 72 hours to pay the ransom. If
you don’t pay during this timeframe then the cost of decrypting
your data could increase.
If they offer you an extension but the payment hasn’t been
completed, it’s possible that they will delete the decryption key,
making it impossible to recover the company’s files.
Even if the payment is carried out, there is no guarantee that
your data will be returned. This is because it is possible that the
software developed by the cybercriminals contains bugs that
cause a corruption in the decryption process, or law enforcement
agencies are constantly trying to interrupt the cybercriminals
infrastructure.
8
What to do if you
are a victim of cyber
extortion?
9
Don’t give in to
the cybercriminals’
blackmail.
There is no guarantee that this will solve
the problem.
In fact, in many cases, the victim of the
blackmailing has given over the amount
demanded but without receiving the
decryption key (or even a corrupted key).
None of these outcomes can help get the
kidnapped information back.
Repeated blackmailing is also common.
Once the information is returned, the
cybercriminals install processes which
continue to encrypt the company’s data
in no time.
On other occasions, the cybercriminal
negotiates a higher amount than
originally demanded, depending on the
perceived desperation of the victim or
the company’s financial situation.
Completely wipe all
traces of malware
from your computers.
To do this, Panda recommends using
Cloud Cleaner in offline mode, a solution
that specializes in removing all traces
of advanced viruses from affected
computers.
Recover all
your encrypted
files.
To do this it is necessary to have
previously activated the File History
(in Windows 8.1 and 10) or System
Protection (Windows 7 and Vista), which
will allow for changes made by the
malware on data files to be reversed.
It is also recommended that you make
security copies of critical files every so
often. Should you have a recent backup
of your important documents we advise
scanning these for any remnants of
malware before restoring them.
It must be kept in
mind that this type
of threat has become
extremely popular.
In fact, ransomware is a billion-dollar industry. One estimate showed that a
single strain of ransomware, Cryptowall 3.0, made over $325 million from US
victims in 2015 alone.
Besides, the increased number of mutations, coupled with new strains of
ransomware that are constantly appearing, makes it difficult for traditional
antiviruses that are based on signature files to detect them.
This is why it is fundamental to have an advanced security solution that
detects and protects your computers from direct attacks, Zero-Days, and
new versions of Ransomware.
11
What does a malware consist
of and what are the most
common types?
Well, it is any type of malicious program or IT code whose
objective is to infiltrate networks and computers to cause
damage, spy, and steal information. The most dangerous types of
malware are:
RANSOMWARE
It blocks the PC, removing all user control, encrypts files
and demands a financial ransom to return them.
EXPLOIT
It takes advantage of a security fault or vulnerability in
the communication protocols to enter your computer.
SPYWARE
It collects names, access details, passwords, and any type
of information about your company.
PHISHING
It creates a false URL to obtain your data and steal your
identity, with the aim of stealing from your bank accounts.
TROJAN
It installs various applications so that hackers can control
the computer. They control your files and steal your
confidential information.
APT (ADVANCED PERSISTENT THREAT)
It’s a computer process that penetrates your security to
control and monitor it, being able to continually extract
information for business or political means.
SCAM
It tricks you with false promotions such as holidays or
lotteries, then asks you for money to access the “prize”.
BACKDOOR
It opens a “back door” to take control of your system.
KEYLOGGER
It collects and sends all keystrokes completed by the user.
BOT
It is a program that remotely controls your PC.
WORM
It infects all of your computers, slowing down the network
and even blocking access to communications.
12
Evolution of malware,
complexity and sophistication.
The technology used by traditional antiviruses (signature files,
heuristic) are reactive. 18% of new malware isn’t detected
by traditional antiviruses in the first 24 hours, and 2% is still
undetected 3 months later.
Can these antiviruses stop
advanced threats?
No antivirus can do this. In fact, There are websites online that
allow you to see if a certain malware will be detected by an
antivirus. Hackers then launch their malicious code once they
have verified that it won’t be detected by any antivirus.
24 hours
3 days
7 days
1 month
3 months
% Non-detected viruses
18%
9%
7%
4%
2%
70%
80%
90%
100%
13
Panda Security’s 5
Recommendations to
prevent Cyberattacks
14
Develop internal
protocols
Establish protocols and security measures to
control the installation and execution of any
software. You should also check the inventory of
your applications frequently.
A solution that fit
your needs
Ensure that you have the security solution that
your company needs and keep it updated.
A solution with different security layers that should
be able to detect and block advanced threats.
Make your
users aware
Make sure that your users know the risks of
phishing and that they don’t download unknown
applications - or ones not provided by the
company - and to avoid untrusted websites.
Be aware on the
Internet
Set out policies for surfing the Internet that
controls the reputation of websites that
can be accessed.
Keep your systems &
applications updated
Determine a policy for updating your applications
and for blocking or eliminating them if they aren’t
needed by the company.
It is very important to get protected from
applications that, even they are trustworthy
(such us Java, Office, Chrome, Mozilla or Adobe), they
can have some vulnerabilities or security holes
that can be exploited by cybercriminals.
15
Image: The toolbars present a big security risk.
16
How can you really
protect your company?
17
Panda Security has
developed the first solution
that guarantees continuous
monitoring of 100% of the
active processes.
Panda Security has developed the only cybersecurity solution
that is capable of protecting your company against direct
attacks, Zero-Days, or any type of advanced threat, including
Cryptolocker.
It is the first product on the market that guarantees to
completely protect computers and servers, thanks to
continuously monitoring 100% of the processes on the endpoint.
18
Adaptive Defense 360 offers
the greatest security levels
available, far ahead of any
other antivirus on the market.
Adaptive Defense 360 monitors, registers, and classifies 100%
of the running applications which, combined with EDR features,
allows us to detect and block the malware that other protection
systems don’t even see.
Traditional Antiviruses
They only recognize malware but nothing else.
Adaptive Defense 360
It monitors absolutely all the active processes.
Work flow
Risk
Managed Service
Objective: 0 Risk
As they can’t classify anything suspicious, these attacks
represent a huge security problem for the traditional antivirus
(especially targeted and zero-day attacks).
Adaptive Defense 360 knows with certainty if a process is good or
bad, it classifies absolutely everything so that there is no suspicion.
19
Being able to control
absolutely everything that
happens on your computers
allows you to:
Detect information leaks, both from malware and employees and
from any archive that contains data (pdf, word, excel, txt,...).
Discover and solve vulnerabilities on your systems and
applications, and prevent the use of unwanted programs.
Detect direct attacks aimed at your systems.
20
It detects and blocks the malware
that other systems miss.
Limitless Visibilty, Absolute Control
Monitors, records and classifies
100% of running applications.
21
It protects more than 500,000 endpoints
and servers worldwide.
It has mitigated more than 1,100,000
security breaches in the last year alone.
It has detected malware in 100% of the
environments it has been installed in,
independently of the existing protection
mechanisms.
It has saved more than 550,000 hours in IT
resources, which amounts to an estimated
saving of €34.8 million.
It has categorized more than 1.5 million
applications.
What’s more, it comes with Panda Security’s 25 years of experience, which makes us a pioneer in malware detection and in implementing
innovative security solutions.
Not to mention that more than 30 million endpoints are currently protected by Panda worldwide.
Adaptive Defense 360 in numbers
500K 1.5M
1.1M 550K
100%
Data from 2015.
BENELUX
+32 15 45 12 80
belgium@pandasecurity.com
BRAZIL
+55 11 3054-1722
brazil@pandasecurity.com
FRANCE
+33 (0) 1 46842 000
commercial@fr.pandasecurity.com
GERMANY (AND AUSTRIA)
+49 (0) 2065 961-0
sales@de.pandasecurity.com
GREECE
+30 211 18 09 000
greece@pandasecurity.com
HUNGARY
+36 1 224 03 16
hungary@pandasecurity.com
ITALY
+39 02 24 20 22 08
italy@pandasecurity.com
MEXICO
+52 55 8000 2381
mexico@pandasecurity.com
NORWAY
+47 93 409 300
norway@pandasecurity.com
PORTUGAL
+351 210 414 400
geral@pt.pandasecurity.com
SPAIN
+34 900 90 70 80
comercialpanda@pandasecurity.com
SWEDEN (FINLAND & DENMARK)
+46 0850 553 200
sweden@pandasecurity.com
SWITZERLAND
+41 22 994 89 40
info@ch.pandasecurity.com
UNITED KINGDOM
+44 (0) 844 335 3791
sales@uk.pandasecurity.com
USA (AND CANADA)
+1 877 263 3881
sales@us.pandasecurity.com
Contact us for more information

More Related Content

What's hot

Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalJerome Chapolard
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
Ioannis Aligizakis, M.Sc.
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White Paper
NetIQ
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
IBM Security
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
Amazon Web Services
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
Jorge Sebastiao
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
CMR WORLD TECH
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKRobert Anderson
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
FireEye, Inc.
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
Arrow ECS UK
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
Ulf Mattsson
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Katherine Duffy
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept*****Dominic A Ienco
 

What's hot (19)

Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White Paper
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
 

Viewers also liked

Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malware
Panda Security
 
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risksGerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Vanbreda Risk & Benefits
 
Panda Security - Presentación corporativa
Panda Security - Presentación corporativa Panda Security - Presentación corporativa
Panda Security - Presentación corporativa
Panda Security
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
Risk factor
Risk factorRisk factor
Risk factor
Amirul Ismail
 
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...
Abdulkadir Sugal
 

Viewers also liked (7)

Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malware
 
Plep inteligencia humana
Plep inteligencia humanaPlep inteligencia humana
Plep inteligencia humana
 
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risksGerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risks
 
Panda Security - Presentación corporativa
Panda Security - Presentación corporativa Panda Security - Presentación corporativa
Panda Security - Presentación corporativa
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Risk factor
Risk factorRisk factor
Risk factor
 
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...
 

Similar to Panda Adaptive Defense 360 - Cyber Extortion Guide

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
Protected Harbor
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
ArindamGhosal6
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
Jessica Howard
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
KavitaDubey18
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
Infosectrain3
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
ollyabraham
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Greg Wartes, MCP
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
larry1401
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
fantaghost
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
SOCVault
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 

Similar to Panda Adaptive Defense 360 - Cyber Extortion Guide (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 

More from Panda Security

Entrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda SecurityEntrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda Security
Panda Security
 
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security ¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
Panda Security
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
Panda Security
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
Panda Security
 
Panda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientesPanda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientes
Panda Security
 
Panda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clients
Panda Security
 
Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017
Panda Security
 
Ataques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridadAtaques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridad
Panda Security
 
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
Panda Security
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
Panda Security
 
How can your information be kidnapped?
How can your information be kidnapped?How can your information be kidnapped?
How can your information be kidnapped?
Panda Security
 
Traditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive DefenseTraditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive Defense
Panda Security
 
Are (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - InfographicAre (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Panda Security
 
Ataques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda SecurityAtaques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda Security
Panda Security
 
Panda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security - The Hotel Hijackers
Panda Security - The Hotel Hijackers
Panda Security
 
Panda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hoteleroPanda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hotelero
Panda Security
 
Panda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão CibernéticaPanda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Security
 
Guía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la CiberextorsiónGuía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la Ciberextorsión
Panda Security
 
Panda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de FacebookPanda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de Facebook
Panda Security
 

More from Panda Security (20)

Entrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda SecurityEntrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda Security
 
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security ¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
Panda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientesPanda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientes
 
Panda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clients
 
Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017
 
Ataques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridadAtaques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridad
 
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
How can your information be kidnapped?
How can your information be kidnapped?How can your information be kidnapped?
How can your information be kidnapped?
 
Traditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive DefenseTraditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive Defense
 
Are (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - InfographicAre (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
 
Ataques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda SecurityAtaques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda Security
 
Panda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security - The Hotel Hijackers
Panda Security - The Hotel Hijackers
 
Panda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hoteleroPanda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hotelero
 
Panda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão CibernéticaPanda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
 
Guía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la CiberextorsiónGuía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la Ciberextorsión
 
Panda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de FacebookPanda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de Facebook
 

Recently uploaded

Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 

Recently uploaded (20)

Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 

Panda Adaptive Defense 360 - Cyber Extortion Guide

  • 2. 2 European organizations are the ones that suffer the highest number of sensitive data theft. The outlook for 2016 is that Europe will continue to be at risk of cyberattacks. 91% of SMEs have been targets of IT attacks Source: Shopper Software Security in SMBs. Nielsen, April 2015
  • 3. Ignoring malware attacks is a risk not worth taking. Panda presents you with advice to keep your company safe and your mind at ease.
  • 5. 5 Cyber extortion is a form of blackmail in which victims of an IT attack are forced to pay to avoid its effects. One of the most widespread methods of cyber extortion is ransomware. This attack encrypts the victim’s information and then demands a ransom in order for the information to be decrypted and returned. Once involved in the blackmail, having paid the ransom demanded by the cybercriminal, the victim of a cyber extortion usually receives an email with the code to decrypt their information. The method of payment is usually Bitcoin, a digital currency that can be exchanged for real money (1 Bitcoin = $380). In fact, they usually use this payment method to hamper its traceability. However, the payment doesn’t guarantee that the business won’t be attacked again in the future. Other similar attacks that use this kind of extortion are ones which infect your computer and access its webcam, then blackmail you so that they do not spread the videos. The majority of attacks start with emails that include attached documents or by visiting unsecure websites. 39% Unsafe and fraudulent websites 23% Software download 19% Malware received by email Sources of Infection Source: Shopper Software Security in SMBs. Nielsen, April 2015
  • 6. 6 How do cybercriminals use ransomware for attacks?
  • 7. 7 Ransomware such as Cryptolocker, Cyptowall, or Coinvault threaten the integrity of files that are found on the computer or network drives that they have access to. The malware encrypts the data so that it can only be decrypted using a key that the cybercriminals will hand over if the business pays the requested ransom. If you are one of the companies affected by ransomware then you usually have between 48 and 72 hours to pay the ransom. If you don’t pay during this timeframe then the cost of decrypting your data could increase. If they offer you an extension but the payment hasn’t been completed, it’s possible that they will delete the decryption key, making it impossible to recover the company’s files. Even if the payment is carried out, there is no guarantee that your data will be returned. This is because it is possible that the software developed by the cybercriminals contains bugs that cause a corruption in the decryption process, or law enforcement agencies are constantly trying to interrupt the cybercriminals infrastructure.
  • 8. 8 What to do if you are a victim of cyber extortion?
  • 9. 9 Don’t give in to the cybercriminals’ blackmail. There is no guarantee that this will solve the problem. In fact, in many cases, the victim of the blackmailing has given over the amount demanded but without receiving the decryption key (or even a corrupted key). None of these outcomes can help get the kidnapped information back. Repeated blackmailing is also common. Once the information is returned, the cybercriminals install processes which continue to encrypt the company’s data in no time. On other occasions, the cybercriminal negotiates a higher amount than originally demanded, depending on the perceived desperation of the victim or the company’s financial situation. Completely wipe all traces of malware from your computers. To do this, Panda recommends using Cloud Cleaner in offline mode, a solution that specializes in removing all traces of advanced viruses from affected computers. Recover all your encrypted files. To do this it is necessary to have previously activated the File History (in Windows 8.1 and 10) or System Protection (Windows 7 and Vista), which will allow for changes made by the malware on data files to be reversed. It is also recommended that you make security copies of critical files every so often. Should you have a recent backup of your important documents we advise scanning these for any remnants of malware before restoring them.
  • 10. It must be kept in mind that this type of threat has become extremely popular. In fact, ransomware is a billion-dollar industry. One estimate showed that a single strain of ransomware, Cryptowall 3.0, made over $325 million from US victims in 2015 alone. Besides, the increased number of mutations, coupled with new strains of ransomware that are constantly appearing, makes it difficult for traditional antiviruses that are based on signature files to detect them. This is why it is fundamental to have an advanced security solution that detects and protects your computers from direct attacks, Zero-Days, and new versions of Ransomware.
  • 11. 11 What does a malware consist of and what are the most common types? Well, it is any type of malicious program or IT code whose objective is to infiltrate networks and computers to cause damage, spy, and steal information. The most dangerous types of malware are: RANSOMWARE It blocks the PC, removing all user control, encrypts files and demands a financial ransom to return them. EXPLOIT It takes advantage of a security fault or vulnerability in the communication protocols to enter your computer. SPYWARE It collects names, access details, passwords, and any type of information about your company. PHISHING It creates a false URL to obtain your data and steal your identity, with the aim of stealing from your bank accounts. TROJAN It installs various applications so that hackers can control the computer. They control your files and steal your confidential information. APT (ADVANCED PERSISTENT THREAT) It’s a computer process that penetrates your security to control and monitor it, being able to continually extract information for business or political means. SCAM It tricks you with false promotions such as holidays or lotteries, then asks you for money to access the “prize”. BACKDOOR It opens a “back door” to take control of your system. KEYLOGGER It collects and sends all keystrokes completed by the user. BOT It is a program that remotely controls your PC. WORM It infects all of your computers, slowing down the network and even blocking access to communications.
  • 12. 12 Evolution of malware, complexity and sophistication. The technology used by traditional antiviruses (signature files, heuristic) are reactive. 18% of new malware isn’t detected by traditional antiviruses in the first 24 hours, and 2% is still undetected 3 months later. Can these antiviruses stop advanced threats? No antivirus can do this. In fact, There are websites online that allow you to see if a certain malware will be detected by an antivirus. Hackers then launch their malicious code once they have verified that it won’t be detected by any antivirus. 24 hours 3 days 7 days 1 month 3 months % Non-detected viruses 18% 9% 7% 4% 2% 70% 80% 90% 100%
  • 13. 13 Panda Security’s 5 Recommendations to prevent Cyberattacks
  • 14. 14 Develop internal protocols Establish protocols and security measures to control the installation and execution of any software. You should also check the inventory of your applications frequently. A solution that fit your needs Ensure that you have the security solution that your company needs and keep it updated. A solution with different security layers that should be able to detect and block advanced threats. Make your users aware Make sure that your users know the risks of phishing and that they don’t download unknown applications - or ones not provided by the company - and to avoid untrusted websites. Be aware on the Internet Set out policies for surfing the Internet that controls the reputation of websites that can be accessed. Keep your systems & applications updated Determine a policy for updating your applications and for blocking or eliminating them if they aren’t needed by the company. It is very important to get protected from applications that, even they are trustworthy (such us Java, Office, Chrome, Mozilla or Adobe), they can have some vulnerabilities or security holes that can be exploited by cybercriminals.
  • 15. 15 Image: The toolbars present a big security risk.
  • 16. 16 How can you really protect your company?
  • 17. 17 Panda Security has developed the first solution that guarantees continuous monitoring of 100% of the active processes. Panda Security has developed the only cybersecurity solution that is capable of protecting your company against direct attacks, Zero-Days, or any type of advanced threat, including Cryptolocker. It is the first product on the market that guarantees to completely protect computers and servers, thanks to continuously monitoring 100% of the processes on the endpoint.
  • 18. 18 Adaptive Defense 360 offers the greatest security levels available, far ahead of any other antivirus on the market. Adaptive Defense 360 monitors, registers, and classifies 100% of the running applications which, combined with EDR features, allows us to detect and block the malware that other protection systems don’t even see. Traditional Antiviruses They only recognize malware but nothing else. Adaptive Defense 360 It monitors absolutely all the active processes. Work flow Risk Managed Service Objective: 0 Risk As they can’t classify anything suspicious, these attacks represent a huge security problem for the traditional antivirus (especially targeted and zero-day attacks). Adaptive Defense 360 knows with certainty if a process is good or bad, it classifies absolutely everything so that there is no suspicion.
  • 19. 19 Being able to control absolutely everything that happens on your computers allows you to: Detect information leaks, both from malware and employees and from any archive that contains data (pdf, word, excel, txt,...). Discover and solve vulnerabilities on your systems and applications, and prevent the use of unwanted programs. Detect direct attacks aimed at your systems.
  • 20. 20 It detects and blocks the malware that other systems miss. Limitless Visibilty, Absolute Control Monitors, records and classifies 100% of running applications.
  • 21. 21 It protects more than 500,000 endpoints and servers worldwide. It has mitigated more than 1,100,000 security breaches in the last year alone. It has detected malware in 100% of the environments it has been installed in, independently of the existing protection mechanisms. It has saved more than 550,000 hours in IT resources, which amounts to an estimated saving of €34.8 million. It has categorized more than 1.5 million applications. What’s more, it comes with Panda Security’s 25 years of experience, which makes us a pioneer in malware detection and in implementing innovative security solutions. Not to mention that more than 30 million endpoints are currently protected by Panda worldwide. Adaptive Defense 360 in numbers 500K 1.5M 1.1M 550K 100% Data from 2015.
  • 22. BENELUX +32 15 45 12 80 belgium@pandasecurity.com BRAZIL +55 11 3054-1722 brazil@pandasecurity.com FRANCE +33 (0) 1 46842 000 commercial@fr.pandasecurity.com GERMANY (AND AUSTRIA) +49 (0) 2065 961-0 sales@de.pandasecurity.com GREECE +30 211 18 09 000 greece@pandasecurity.com HUNGARY +36 1 224 03 16 hungary@pandasecurity.com ITALY +39 02 24 20 22 08 italy@pandasecurity.com MEXICO +52 55 8000 2381 mexico@pandasecurity.com NORWAY +47 93 409 300 norway@pandasecurity.com PORTUGAL +351 210 414 400 geral@pt.pandasecurity.com SPAIN +34 900 90 70 80 comercialpanda@pandasecurity.com SWEDEN (FINLAND & DENMARK) +46 0850 553 200 sweden@pandasecurity.com SWITZERLAND +41 22 994 89 40 info@ch.pandasecurity.com UNITED KINGDOM +44 (0) 844 335 3791 sales@uk.pandasecurity.com USA (AND CANADA) +1 877 263 3881 sales@us.pandasecurity.com Contact us for more information