SlideShare a Scribd company logo
Ransomware & Ethical
Hacking
Presented by :-
Hemraj Singh Chouhan
facebook.com/hschouhan
www.LinuxAcademy.org
Disclaimer :
I am here not to teach you
Hacking but I want you to
be on High Alert against
“Cyber Terrorism”
We believe that they are Dangerous !!!
Ku Klux Klan
26/11 Attack Head
ISIS Head
I Personally feel…. NO, not that much !!
They are thousands of miles away from
India...
Yes… Using Side effects of
Cashless India, they just need to Hack
only 1000 bank ACCOUNTS and let this
news spread via Indian Media and will create
Chaos...
and Yes...from 1000’s of miles away,
they are in connection with few 100’s of
youth in India..
Via Cyber Means & Ways..
Surface Web
V/s
DeepWeb
Most of the times we only
open the websites listed in
popular search
engine’s
Deep Web Contents are
not listed in search
engines so we can not find
those in Google
Search engines only
stores data of static url like :-
LinuxAcademy.org
LinuxAcademy.org/contactus.html
LinuxAcademy.org/about.html
Static URL
How Antisocial elements gets access to
Deep web
Tor
Browser
As I am a cyber law student, I just want to alert you once again using this browser
may put you bhind the bars
Your IP Address is bouncing..
You are not able to open this website on any other browser..
Don’t try to install TOR, Checkout the warning on the
top…..
Payment Mechanism
Online Virtual Currency
(All Sort of Extortion Money – Ransom, is paid in Bitcoin online)
Conversion Rate
July 2010 -> 1 BTC = $0.08
15 Dec 2016 -> 1 BTC = $779
Bitcoin is a Cryptocurrency, a form of money that uses
cryptography to control its creation and management, rather than
relying on central authorities. Satoshi Nakamoto (the
creator of bitcoin) integrated many existing ideas from the
cypherpunk community when creating bitcoin.
Creation
In November 2008, a paper was posted on the internet under
the name Satoshi Nakamoto titled bitcoin : A “Peer-to-Peer
Electronic Cash System”.
How do Cyber terrorist’s identify & targets you….
What do you think who is
Biggest Hacker
in this world ??
Google, Google is the biggest Hacker as you saw
in previous slides that all data related with Surface web
is available with search engines.
So if you want to stay safe like China or Russia then you need to stop googling.
NSA is watching you so closely that you can’t imagine.
Best example of Google Data Mining is Google Traffic
Gabriel Weinberg launched DuckDuckGo as a
search engine that puts privacy first, rather than
collecting data for advertisers and security
agencies…
The search engine that doesn't track you.
Move on to...
Ransomware
The first ever computer virus was developed in
1986 by two Pakistani brothers in Lahore. The first
computer virus named "Brain" was designed by Amjad
Farooq Alvi and Basit Farooq Alvi
Variety of Virus available with us :
Virus
Worms
Trojans
Spyware
Malware
now Ransomware
Deep Web Users are not generating much money
so they created Ransomware (Ransom + Ware)
RANSOMWARE
Ransomware is a new type of virus that attempts to
extort money from a computer user by infecting and
tacking control of the victim’s machine, or the files or
documents stored on it.
Typically, the Ransomware will either
‘Lock’ the computer to prevent normal usage, or
encrypt the documents and files on it to prevent
access to the saved data.
RANSOMWARE
Only 15%chance is there to get data back
once it is encrypted using 128 Bit encyrption.
They demand Ransom in Bitcoins
using Dark Web, so their detection in
next to impossible.
RANSOMWARE
It will not attack on each every system,
Ransomware only encrypts the
system containing Data files.
TYPES OF RANSOMWARE
 The most common type displays messages
intended to coax the user into paying (Eg. Your
machine is infected)
 More destructive types encrypt files in the
system’s hardware (Encryption Ransomware)
 A new released version actually locks the
operating system (Lock Screen RansomWare)
 Master Boot Record (MBR) Ransomware
Screenshot of Ransomware
Attack in office of
CA Anshul Agrawal
HOW RANSOMWARE IS
DEPLOYED
 ATTACHMENTS- Most come through as ZIP
files or “invoices”
 ADVERTISEMENTS - Ad Network are often
targeted and exploited for these types of attack
 SECURITY HOLES - Java,Flash,Macros
(Word,Excel)
HOW RANSOMWARE IS
DEPLOYED
 Using Pen Drive on public computers in
Windows Environment.
 Using Pirated Windows & Pirated Antivirus
 Using Public Wifi / Open Public Network
 Using Internet Explorer
Free - Wifi
STRATEGIES
TO COMBAT RANSOMWARE
USE LINUX-
There have been no reported cases of
Ransomware taking over anyone's Linux based
operating system so why not join the millions of
people who have left Windows behind for a more
secure way of working.
CA’s can use Linux Machine as their DATA
Server
STRATEGIES
TO COMBAT RANSOMWARE
BACKUP YOUR FILES USING DROPBOX
or any other cloud Software
Backing up your files is still a good idea however for reasons
mentioned earlier such as protecting against disk failures, fires
and burglary.
Solution
 Right now we Don’t have any solution of high
end Ransomware like Cerber
 Quick Heal and other antivirus company are
providing solutions for lower end Ransomwares
which is approx 10%
WHAT YOU DO IF YOU ARE
INFECTED
 Power Down - Power off your computer
immediately
 Call For Help - Call person in charge of IT
 Describe-Everyone makes mistakes BE
HONEST about what happened,what
you saw and what you were doing
Thankyou
For any Query or Suggestions : -
www.facebook.com/hschouhan
Call us at – 4700646, 9981511646
info@linuxacademy.org

More Related Content

What's hot

Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
Avinash Sinha
 
Basic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationBasic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentation
Vipin Rawat @ daya
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
amansyal
 
So692 cyber security-document
So692 cyber security-documentSo692 cyber security-document
So692 cyber security-document
Subhadeep Chakraborty
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manish Mudhliyar
 
Protect your website
Protect your websiteProtect your website
Protect your website
Muthu Natarajan
 
The malware effects
The malware effectsThe malware effects
The malware effects
Viral Parmar
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
Sina Manavi
 
rensomware final ppt
rensomware final pptrensomware final ppt
rensomware final ppt
Komal Keshwer
 
GNUCITIZEN Pdp Owasp Day September 2007
GNUCITIZEN Pdp Owasp Day   September 2007GNUCITIZEN Pdp Owasp Day   September 2007
GNUCITIZEN Pdp Owasp Day September 2007
guest20ab09
 
Xss attack
Xss attackXss attack
Xss attack
Manjushree Mashal
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
Mikel Solabarrieta
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
scottgelbard123
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
Jeremiah Grossman
 
Wannacry
WannacryWannacry
Wannacry
AravindVV
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Beefy WordPress Security Wordcamp 2012 by Tammy Lee
Beefy WordPress Security Wordcamp 2012 by Tammy LeeBeefy WordPress Security Wordcamp 2012 by Tammy Lee
Beefy WordPress Security Wordcamp 2012 by Tammy Lee
Top Draw Inc.
 
4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquad
Josh Howell
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Mazin Ahmed
 
Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea, Inc.
 

What's hot (20)

Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Basic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationBasic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentation
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
So692 cyber security-document
So692 cyber security-documentSo692 cyber security-document
So692 cyber security-document
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Protect your website
Protect your websiteProtect your website
Protect your website
 
The malware effects
The malware effectsThe malware effects
The malware effects
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
 
rensomware final ppt
rensomware final pptrensomware final ppt
rensomware final ppt
 
GNUCITIZEN Pdp Owasp Day September 2007
GNUCITIZEN Pdp Owasp Day   September 2007GNUCITIZEN Pdp Owasp Day   September 2007
GNUCITIZEN Pdp Owasp Day September 2007
 
Xss attack
Xss attackXss attack
Xss attack
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
Wannacry
WannacryWannacry
Wannacry
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Beefy WordPress Security Wordcamp 2012 by Tammy Lee
Beefy WordPress Security Wordcamp 2012 by Tammy LeeBeefy WordPress Security Wordcamp 2012 by Tammy Lee
Beefy WordPress Security Wordcamp 2012 by Tammy Lee
 
4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquad
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 
Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014Invincea fake british airways ticket spear-phish malware 03-21-2014
Invincea fake british airways ticket spear-phish malware 03-21-2014
 

Similar to Presentation of Cyber terrorism, Bitcoins & Ransomware

Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
Lokesh Bysani
 
What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?
K7 Computing Pvt Ltd
 
What’s the Difference Between Identity Fraud and Identity Theft.docx.pptx
What’s the Difference Between Identity Fraud and Identity Theft.docx.pptxWhat’s the Difference Between Identity Fraud and Identity Theft.docx.pptx
What’s the Difference Between Identity Fraud and Identity Theft.docx.pptx
kesavanrachel
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
MavrickHost - Reliable Hosting Partner
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
Milan Santana
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Hacking
HackingHacking
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
Nathan Winters
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
marwanmohammed_
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
Roel Palmaers
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 

Similar to Presentation of Cyber terrorism, Bitcoins & Ransomware (20)

Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?What’s the Difference Between Identity Fraud and Identity Theft?
What’s the Difference Between Identity Fraud and Identity Theft?
 
What’s the Difference Between Identity Fraud and Identity Theft.docx.pptx
What’s the Difference Between Identity Fraud and Identity Theft.docx.pptxWhat’s the Difference Between Identity Fraud and Identity Theft.docx.pptx
What’s the Difference Between Identity Fraud and Identity Theft.docx.pptx
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Ransomware
RansomwareRansomware
Ransomware
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Hacking
HackingHacking
Hacking
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Security threats
Security threatsSecurity threats
Security threats
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 

Presentation of Cyber terrorism, Bitcoins & Ransomware

  • 1. Ransomware & Ethical Hacking Presented by :- Hemraj Singh Chouhan facebook.com/hschouhan www.LinuxAcademy.org
  • 2. Disclaimer : I am here not to teach you Hacking but I want you to be on High Alert against “Cyber Terrorism”
  • 3. We believe that they are Dangerous !!! Ku Klux Klan 26/11 Attack Head ISIS Head
  • 4. I Personally feel…. NO, not that much !! They are thousands of miles away from India...
  • 5. Yes… Using Side effects of Cashless India, they just need to Hack only 1000 bank ACCOUNTS and let this news spread via Indian Media and will create Chaos...
  • 6. and Yes...from 1000’s of miles away, they are in connection with few 100’s of youth in India.. Via Cyber Means & Ways..
  • 8.
  • 9.
  • 10.
  • 11. Most of the times we only open the websites listed in popular search engine’s
  • 12. Deep Web Contents are not listed in search engines so we can not find those in Google
  • 13. Search engines only stores data of static url like :- LinuxAcademy.org LinuxAcademy.org/contactus.html LinuxAcademy.org/about.html Static URL
  • 14.
  • 15. How Antisocial elements gets access to Deep web Tor Browser As I am a cyber law student, I just want to alert you once again using this browser may put you bhind the bars
  • 16.
  • 17. Your IP Address is bouncing..
  • 18. You are not able to open this website on any other browser..
  • 19.
  • 20.
  • 21. Don’t try to install TOR, Checkout the warning on the top…..
  • 23. Online Virtual Currency (All Sort of Extortion Money – Ransom, is paid in Bitcoin online)
  • 24. Conversion Rate July 2010 -> 1 BTC = $0.08 15 Dec 2016 -> 1 BTC = $779
  • 25. Bitcoin is a Cryptocurrency, a form of money that uses cryptography to control its creation and management, rather than relying on central authorities. Satoshi Nakamoto (the creator of bitcoin) integrated many existing ideas from the cypherpunk community when creating bitcoin. Creation In November 2008, a paper was posted on the internet under the name Satoshi Nakamoto titled bitcoin : A “Peer-to-Peer Electronic Cash System”.
  • 26.
  • 27. How do Cyber terrorist’s identify & targets you…. What do you think who is Biggest Hacker in this world ??
  • 28. Google, Google is the biggest Hacker as you saw in previous slides that all data related with Surface web is available with search engines. So if you want to stay safe like China or Russia then you need to stop googling. NSA is watching you so closely that you can’t imagine. Best example of Google Data Mining is Google Traffic
  • 29. Gabriel Weinberg launched DuckDuckGo as a search engine that puts privacy first, rather than collecting data for advertisers and security agencies… The search engine that doesn't track you.
  • 31. The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore. The first computer virus named "Brain" was designed by Amjad Farooq Alvi and Basit Farooq Alvi
  • 32. Variety of Virus available with us : Virus Worms Trojans Spyware Malware now Ransomware Deep Web Users are not generating much money so they created Ransomware (Ransom + Ware)
  • 33. RANSOMWARE Ransomware is a new type of virus that attempts to extort money from a computer user by infecting and tacking control of the victim’s machine, or the files or documents stored on it. Typically, the Ransomware will either ‘Lock’ the computer to prevent normal usage, or encrypt the documents and files on it to prevent access to the saved data.
  • 34.
  • 35. RANSOMWARE Only 15%chance is there to get data back once it is encrypted using 128 Bit encyrption. They demand Ransom in Bitcoins using Dark Web, so their detection in next to impossible.
  • 36. RANSOMWARE It will not attack on each every system, Ransomware only encrypts the system containing Data files.
  • 37. TYPES OF RANSOMWARE  The most common type displays messages intended to coax the user into paying (Eg. Your machine is infected)  More destructive types encrypt files in the system’s hardware (Encryption Ransomware)  A new released version actually locks the operating system (Lock Screen RansomWare)  Master Boot Record (MBR) Ransomware
  • 38. Screenshot of Ransomware Attack in office of CA Anshul Agrawal
  • 39.
  • 40.
  • 41. HOW RANSOMWARE IS DEPLOYED  ATTACHMENTS- Most come through as ZIP files or “invoices”  ADVERTISEMENTS - Ad Network are often targeted and exploited for these types of attack  SECURITY HOLES - Java,Flash,Macros (Word,Excel)
  • 42. HOW RANSOMWARE IS DEPLOYED  Using Pen Drive on public computers in Windows Environment.  Using Pirated Windows & Pirated Antivirus  Using Public Wifi / Open Public Network  Using Internet Explorer
  • 44. STRATEGIES TO COMBAT RANSOMWARE USE LINUX- There have been no reported cases of Ransomware taking over anyone's Linux based operating system so why not join the millions of people who have left Windows behind for a more secure way of working. CA’s can use Linux Machine as their DATA Server
  • 45. STRATEGIES TO COMBAT RANSOMWARE BACKUP YOUR FILES USING DROPBOX or any other cloud Software Backing up your files is still a good idea however for reasons mentioned earlier such as protecting against disk failures, fires and burglary.
  • 46. Solution  Right now we Don’t have any solution of high end Ransomware like Cerber  Quick Heal and other antivirus company are providing solutions for lower end Ransomwares which is approx 10%
  • 47. WHAT YOU DO IF YOU ARE INFECTED  Power Down - Power off your computer immediately  Call For Help - Call person in charge of IT  Describe-Everyone makes mistakes BE HONEST about what happened,what you saw and what you were doing
  • 48. Thankyou For any Query or Suggestions : - www.facebook.com/hschouhan Call us at – 4700646, 9981511646 info@linuxacademy.org