SlideShare a Scribd company logo
1
Ransomware
Protection
2
@rohit11
@sccs1300
Collated and compiled by
3
• A malware that encrypts the victim’s files and
is controlled by the attacker
• Victim is usually an organization but could be
an individual as well
• The attacker “WILL” demand a payment to
decrypt the files
• The attacker might
• Copy victim data before encryption
• Threaten to publish said data (a.k.a. Cyber
Extortion)
• Publish a portion of the data as ‘proof of life’ (to
prove they have your data)
@rohit11|@sccs1300
What is Ransomware?
4
Anatomy of a Ransomware attack
Attacker
Malware comes mostly via
• email
• RDP
• Drive by downloads
Attackers makes a copy of file
(In many cases)
Encrypts the files Demands for ransom
If ransom is paid,
Attacker “MAY” share the
keys to decrypt
@rohit11|@sccs1300
5
Strongest recovery from ransomware
BACKUP
BACKUP
BACKUP
And Backup
@rohit11|@sccs1300
6
Protecting against Ransomware - Basic
Patch and update
@rohit11|@sccs1300
Install advance malware protection
7
Go to Windows Settings > Update & Security
Protecting against Ransomware - Advance
@rohit11|@sccs1300
1. Windows Firewall
8
Firewall & Network Protection
Protecting against Ransomware - Advance
@rohit11|@sccs1300
1. Windows Firewall
9
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Turn on Firewall for each network
1. Windows Firewall
10
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Turn on Firewall for each network
1. Windows Firewall
11
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Turn on Firewall for each network
1. Windows Firewall
12
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Go to Windows Setting > System
2. Disable Remote Desktop
13
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Go to Remote Desktop
2. Disable Remote Desktop
14
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Turn this off.
2. Disable Remote Desktop
15
Protecting against Ransomware - Advance
@rohit11|@sccs1300
If you MUST have Remote Desktop enabled
Ensure “Remote Desktop with Network Level Authentication”
is enabled
Right click on My PC > Properties > Advanced System Settings
> Remote > Select “Allow Connections only from computers
running Remote Desktop with Network Level Authentication
Also configure firewall to allow only from limited set of IP address
2. Disable Remote Desktop
16
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Right click on My PC > Properties > Advanced System Settings
3. Disable Remote Assistance
17
Protecting against Ransomware - Advance
@rohit11|@sccs1300
Disable “Allow Remote Assistance”
3. Disable Remote Assistance
18
Other General Measures
Few other important measures one should consider
• Disable RDP access (port 3389) from the outside world.
• If required allow only from limited IPs, not anyone in the world.
• Disable SMB access (port 139) from the outside world.
• Make sure passwords are strong enough.
• Disable SMB v1
• Disable hidden shares/admin shares etc.
If you still MUST keep RDP open to the world and still want to be secure,
we are just a tweet away…
@rohit11|@sccs1300
19
Should the victim pay the ransom?
@rohit11|@sccs1300
NO
OK. Theoretically, NO
However, it has been seen in past that some medical institutions have paid to ensure life saving systems are working
unaffected.
Remember paying ransom will
fuel their economy and who
knows fuel many other crime in
background…
20
THANK YOU
@rohit11 | @sccs1300

More Related Content

What's hot

Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
Shreedevi Tharanidharan
 
Man in the middle attack .pptx
Man in the middle attack .pptxMan in the middle attack .pptx
Man in the middle attack .pptx
PradeepKumar728006
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 
System hacking
System hackingSystem hacking
System hacking
CAS
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 

What's hot (20)

Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Man in the middle attack .pptx
Man in the middle attack .pptxMan in the middle attack .pptx
Man in the middle attack .pptx
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Ransomware
RansomwareRansomware
Ransomware
 
System hacking
System hackingSystem hacking
System hacking
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 

Similar to Ransomware protection

Hack the hack
Hack the hackHack the hack
Hack the hack
Shakti Ranjan
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
31.ppt
31.ppt31.ppt
31.ppt
31.ppt31.ppt
31.ppt
KarmanChandi
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
Lucy Denver
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Network Security
Network SecurityNetwork Security
Network Security
Angie Perez (LION)
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
Kabul Education University
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
MSA Technosoft
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
hacking
hackinghacking
hacking
ADAIKKAPPANS1
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
CompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdfCompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdf
Furqanuddin10
 
Hacking
HackingHacking

Similar to Ransomware protection (20)

Hack the hack
Hack the hackHack the hack
Hack the hack
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
31.ppt
31.ppt31.ppt
31.ppt
 
31.ppt
31.ppt31.ppt
31.ppt
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
hacking
hackinghacking
hacking
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
CompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdfCompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdf
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 

Recently uploaded (12)

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 

Ransomware protection

  • 3. 3 • A malware that encrypts the victim’s files and is controlled by the attacker • Victim is usually an organization but could be an individual as well • The attacker “WILL” demand a payment to decrypt the files • The attacker might • Copy victim data before encryption • Threaten to publish said data (a.k.a. Cyber Extortion) • Publish a portion of the data as ‘proof of life’ (to prove they have your data) @rohit11|@sccs1300 What is Ransomware?
  • 4. 4 Anatomy of a Ransomware attack Attacker Malware comes mostly via • email • RDP • Drive by downloads Attackers makes a copy of file (In many cases) Encrypts the files Demands for ransom If ransom is paid, Attacker “MAY” share the keys to decrypt @rohit11|@sccs1300
  • 5. 5 Strongest recovery from ransomware BACKUP BACKUP BACKUP And Backup @rohit11|@sccs1300
  • 6. 6 Protecting against Ransomware - Basic Patch and update @rohit11|@sccs1300 Install advance malware protection
  • 7. 7 Go to Windows Settings > Update & Security Protecting against Ransomware - Advance @rohit11|@sccs1300 1. Windows Firewall
  • 8. 8 Firewall & Network Protection Protecting against Ransomware - Advance @rohit11|@sccs1300 1. Windows Firewall
  • 9. 9 Protecting against Ransomware - Advance @rohit11|@sccs1300 Turn on Firewall for each network 1. Windows Firewall
  • 10. 10 Protecting against Ransomware - Advance @rohit11|@sccs1300 Turn on Firewall for each network 1. Windows Firewall
  • 11. 11 Protecting against Ransomware - Advance @rohit11|@sccs1300 Turn on Firewall for each network 1. Windows Firewall
  • 12. 12 Protecting against Ransomware - Advance @rohit11|@sccs1300 Go to Windows Setting > System 2. Disable Remote Desktop
  • 13. 13 Protecting against Ransomware - Advance @rohit11|@sccs1300 Go to Remote Desktop 2. Disable Remote Desktop
  • 14. 14 Protecting against Ransomware - Advance @rohit11|@sccs1300 Turn this off. 2. Disable Remote Desktop
  • 15. 15 Protecting against Ransomware - Advance @rohit11|@sccs1300 If you MUST have Remote Desktop enabled Ensure “Remote Desktop with Network Level Authentication” is enabled Right click on My PC > Properties > Advanced System Settings > Remote > Select “Allow Connections only from computers running Remote Desktop with Network Level Authentication Also configure firewall to allow only from limited set of IP address 2. Disable Remote Desktop
  • 16. 16 Protecting against Ransomware - Advance @rohit11|@sccs1300 Right click on My PC > Properties > Advanced System Settings 3. Disable Remote Assistance
  • 17. 17 Protecting against Ransomware - Advance @rohit11|@sccs1300 Disable “Allow Remote Assistance” 3. Disable Remote Assistance
  • 18. 18 Other General Measures Few other important measures one should consider • Disable RDP access (port 3389) from the outside world. • If required allow only from limited IPs, not anyone in the world. • Disable SMB access (port 139) from the outside world. • Make sure passwords are strong enough. • Disable SMB v1 • Disable hidden shares/admin shares etc. If you still MUST keep RDP open to the world and still want to be secure, we are just a tweet away… @rohit11|@sccs1300
  • 19. 19 Should the victim pay the ransom? @rohit11|@sccs1300 NO OK. Theoretically, NO However, it has been seen in past that some medical institutions have paid to ensure life saving systems are working unaffected. Remember paying ransom will fuel their economy and who knows fuel many other crime in background…