SlideShare a Scribd company logo
WannaCry Ransomware
The biggest cyber-attack extortion in the history of the internet.
What made us cry?
> On May 12, 2017 the world witnessed the biggest ever cyber-attack in the history
of internet, WannaCry - a ransomware which rendered computers across the
globe useless.
> WannaCry hit more than 200,000 organizations from over 150 countries,
shutting down everything from telecoms in Spain to the Interior ministry of
Russia, and affecting 47 NHS trusts in United Kingdom.
> It spreads to other computers via a Server Message Block (SMB) remote code
execution vulnerability in Microsoft Windows computers (MS17-010). This
exploit is named as Eternal Blue.
> This malware locked all the data in the computer and displayed a message
demanding a ransom in exchange to unblock the data.
> The message also indicated that the payment amount will be doubled after
three days. Also, the files will be deleted if payment is not made after seven
days.
Image source: Symantec
> Ransomware is a malicious software program which encrypts all data in a computer
and blocks access to them.
> Often, this malware masquerades as an innocent email attachment or a legitimate
website link conning users to open it.
> Once this malicious file is opened, it attacks the hard drive and encrypts all the files.
> A ransom is demanded for decrypting the files and if the user doesn't oblige, the files
will be deleted. A very short time frame, usually just a few days, is imposed to rack up
pressure.
> The ransom is demanded to be paid in the form of digital currency.
> The use of ransomeware has become an increasing trend among hackers looking for a
quick payout.
What is ransomware?
> WannaCry ransomware demanded $300 worth of the crypto-currency Bitcoin to
decrypt the contents of the affected computers.
> The payment was demanded in bitcoins as this digital currency, popular among
cybercriminals, is decentralised, unregulated and impossible to trace.
> Though $300 might look very small, multiplied by 300,000, the approximate
number of computers affected by WannaCry, the amount becomes humongous.
> But the more important cost - the time lost, the files damaged beyond repair and
other unexpected collateral damage caused by the malware, will be very difficult
to ascertain.
How much was demanded? Why in bitcoins?
> WannaCry shutdown many businesses across the globe, including the European manufacturing plants
of automotive giants Nissan
> Healthcare sector was not spared too; Hospitals in UK, including London's Bart Health NHS Trust, had to
cut back services, and doctors were forced to turn away patients and cancel appointments, after being
forced to shut down equipment to avoid infection.
> Though all patients' records and doctors' filed are claimed to be unaffected by WannaCry, one can never
be sure.
> Overall, organizations are on an overdrive to address these challenges caused by WannaCry:
o Disrupted business operations
o Risk of losing sensitive or patented information
o Financial cost of restoring the systems and data
o Dip in organization’s reputation
Impact of this attack
Were we saved?
> Marcus Hutchins, a cyber security analyst, offered a temporary solution for WannaCry ransomware.
> He analyzed the code used by the worm and found that it referenced a website URL which didn’t exist.
> He bought the domain for $10 and forwarded it to a sinkhole server where it couldn't do any damage. This acted
as a ‘kill switch’ to disable the code.
> Though this ingenious solution may have saved the day, he claims this is definitely not the end to ransomware
problems.
> His statement definitely hints that we could be in for a major war with ramsomware hackers.
Marcus Hutchins says:
“We have stopped this one, but there will be another one coming and it will not be stoppable by us.
There’s a lot of money in this. There’s no reason for them to stop. It’s not really much effort for them to
change the code and then start over. So there’s a good chance they are going to do it… maybe not this
weekend, but quite likely on Monday morning”.
> Victims are advised to not encourage the attackers by succumbing to their
demands. Also, there is no assurance that the affected files will be decrypted once
the ransom is paid.
> The best option is to restore the data from backup. If it isn't an option, try
decrypting the files using recovery tools.
> Work with data recovery experts who can reverse engineer malware and help gain
access to your data.
> Ransomware usually exploit the most recently discovered loopholes and
drawbacks in software systems‘. It is therefore prudent to have the anti-virus and
firewall programs always updated, to prevent infections from originating and
spreading.
If you're a victim, should you pay the ransom?
> Though WannaCry may have been stopped for now, it doesn’t mean you’re completely
immune to it.
> The WannaCry ransomware affects all machines that are using Windows operating
system.
> A security flaw, originally exploited by the U.S. National Security Agency (NSA), was
leaked. It is now being used by hackers to create havoc. If your system runs on
Windows OS, it could be at risk.
> Experts have predicted that many other ransomware strains will make a round soon.
Keep a lookout and secure all your data.
> Prevention is always better than cure. So, take all necessary precautions to save
yourself from the ransomware attack.
Are you at risk?
> Here are few tips to protect your computer from WannaCry ransomware.
> For individuals and small businesses:
o Update your Windows software to the latest edition.
o Backing up data is key! Make a copy and secure it.
o Scan your systems for viruses and malwares using the latest anti-virus software in the market.
> For large organizations:
o To protect against WannaCry, apply the latest Microsoft security patches.
o Backup all your data and store it in a secure location.
o Scan all outgoing and incoming emails with attachments.
o Update anti-virus software and conduct regular scans.
o Spread awareness among employees to identify scams, malicious links and emails.
How to protect yourself?
Don’t let WannaCry make you cry!
For more information, click here.

More Related Content

What's hot

P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
IkramSabir4
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
phexcom1
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
Napier University
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
Nick Miller
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
i-engage
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Wannacry
WannacryWannacry
Wannacry
AravindVV
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
Shreedeep Rayamajhi
 
Ransomware
RansomwareRansomware
Ransomware
DeepakKumar4980
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
Andy Thompson
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 

What's hot (20)

P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Security threats
Security threatsSecurity threats
Security threats
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Wannacry
WannacryWannacry
Wannacry
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Ransomware
RansomwareRansomware
Ransomware
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 

Similar to WannaCry Ransomware

Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
East West University
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
MavrickHost - Reliable Hosting Partner
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Roger Hagedorn
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
Protected Harbor
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
Roel Palmaers
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
kevinmass30
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
Lisa Young
 
SECURITY IN COMPUTING.pptx
SECURITY IN COMPUTING.pptxSECURITY IN COMPUTING.pptx
SECURITY IN COMPUTING.pptx
SHASHANKMISHRA737081
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
MicroWorld Software Services Pvt Ltd
 
Wannacry cyber attack.pptx
Wannacry cyber attack.pptxWannacry cyber attack.pptx
Wannacry cyber attack.pptx
machandi
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
Denise Bailey
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
HiYeti1
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
Cyphort
 
Crucial wannacryoutbreaks
Crucial wannacryoutbreaksCrucial wannacryoutbreaks
Crucial wannacryoutbreaks
kevinmass30
 
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
fatoryoutlets
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
Kevo Meehan
 

Similar to WannaCry Ransomware (20)

Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
SECURITY IN COMPUTING.pptx
SECURITY IN COMPUTING.pptxSECURITY IN COMPUTING.pptx
SECURITY IN COMPUTING.pptx
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
Wannacry cyber attack.pptx
Wannacry cyber attack.pptxWannacry cyber attack.pptx
Wannacry cyber attack.pptx
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
Crucial wannacryoutbreaks
Crucial wannacryoutbreaksCrucial wannacryoutbreaks
Crucial wannacryoutbreaks
 
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 

More from Zoho Corporation

The Future of integrated Identity and Access Management
The Future of integrated Identity and Access ManagementThe Future of integrated Identity and Access Management
The Future of integrated Identity and Access Management
Zoho Corporation
 
One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.
Zoho Corporation
 
Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacks
Zoho Corporation
 
Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...
Zoho Corporation
 
Empowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory managementEmpowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory management
Zoho Corporation
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
Zoho Corporation
 
Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​
Zoho Corporation
 
Overcoming the challenges of Office 365 user management in hybrid environments​
Overcoming the challenges of Office 365 user management in hybrid environments​Overcoming the challenges of Office 365 user management in hybrid environments​
Overcoming the challenges of Office 365 user management in hybrid environments​
Zoho Corporation
 
Self-service password management and single sign-on for on-premises AD and cl...
Self-service password management and single sign-on for on-premises AD and cl...Self-service password management and single sign-on for on-premises AD and cl...
Self-service password management and single sign-on for on-premises AD and cl...
Zoho Corporation
 
Active Directory security and compliance: Comprehensive reporting for key sec...
Active Directory security and compliance: Comprehensive reporting for key sec...Active Directory security and compliance: Comprehensive reporting for key sec...
Active Directory security and compliance: Comprehensive reporting for key sec...
Zoho Corporation
 
7 tips to simplify Active Directory Management ​
7 tips to simplify Active Directory Management ​7 tips to simplify Active Directory Management ​
7 tips to simplify Active Directory Management ​
Zoho Corporation
 
Effective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active DirectoryEffective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active Directory
Zoho Corporation
 
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password AttacksProtecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Zoho Corporation
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active Directory
Zoho Corporation
 
Controlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active DirectoryControlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active Directory
Zoho Corporation
 
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Zoho Corporation
 
ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...
Zoho Corporation
 
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case studyUnisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Zoho Corporation
 
Case study-self-password-management-camh
Case study-self-password-management-camhCase study-self-password-management-camh
Case study-self-password-management-camhZoho Corporation
 
Case study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreisCase study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreisZoho Corporation
 

More from Zoho Corporation (20)

The Future of integrated Identity and Access Management
The Future of integrated Identity and Access ManagementThe Future of integrated Identity and Access Management
The Future of integrated Identity and Access Management
 
One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.
 
Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacks
 
Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...
 
Empowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory managementEmpowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory management
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​
 
Overcoming the challenges of Office 365 user management in hybrid environments​
Overcoming the challenges of Office 365 user management in hybrid environments​Overcoming the challenges of Office 365 user management in hybrid environments​
Overcoming the challenges of Office 365 user management in hybrid environments​
 
Self-service password management and single sign-on for on-premises AD and cl...
Self-service password management and single sign-on for on-premises AD and cl...Self-service password management and single sign-on for on-premises AD and cl...
Self-service password management and single sign-on for on-premises AD and cl...
 
Active Directory security and compliance: Comprehensive reporting for key sec...
Active Directory security and compliance: Comprehensive reporting for key sec...Active Directory security and compliance: Comprehensive reporting for key sec...
Active Directory security and compliance: Comprehensive reporting for key sec...
 
7 tips to simplify Active Directory Management ​
7 tips to simplify Active Directory Management ​7 tips to simplify Active Directory Management ​
7 tips to simplify Active Directory Management ​
 
Effective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active DirectoryEffective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active Directory
 
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password AttacksProtecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
 
Change Monitoring of Active Directory
Change Monitoring of Active DirectoryChange Monitoring of Active Directory
Change Monitoring of Active Directory
 
Controlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active DirectoryControlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active Directory
 
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
 
ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...
 
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case studyUnisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case study
 
Case study-self-password-management-camh
Case study-self-password-management-camhCase study-self-password-management-camh
Case study-self-password-management-camh
 
Case study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreisCase study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreis
 

Recently uploaded

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 

Recently uploaded (20)

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 

WannaCry Ransomware

  • 1. WannaCry Ransomware The biggest cyber-attack extortion in the history of the internet.
  • 2. What made us cry? > On May 12, 2017 the world witnessed the biggest ever cyber-attack in the history of internet, WannaCry - a ransomware which rendered computers across the globe useless. > WannaCry hit more than 200,000 organizations from over 150 countries, shutting down everything from telecoms in Spain to the Interior ministry of Russia, and affecting 47 NHS trusts in United Kingdom. > It spreads to other computers via a Server Message Block (SMB) remote code execution vulnerability in Microsoft Windows computers (MS17-010). This exploit is named as Eternal Blue. > This malware locked all the data in the computer and displayed a message demanding a ransom in exchange to unblock the data. > The message also indicated that the payment amount will be doubled after three days. Also, the files will be deleted if payment is not made after seven days. Image source: Symantec
  • 3. > Ransomware is a malicious software program which encrypts all data in a computer and blocks access to them. > Often, this malware masquerades as an innocent email attachment or a legitimate website link conning users to open it. > Once this malicious file is opened, it attacks the hard drive and encrypts all the files. > A ransom is demanded for decrypting the files and if the user doesn't oblige, the files will be deleted. A very short time frame, usually just a few days, is imposed to rack up pressure. > The ransom is demanded to be paid in the form of digital currency. > The use of ransomeware has become an increasing trend among hackers looking for a quick payout. What is ransomware?
  • 4. > WannaCry ransomware demanded $300 worth of the crypto-currency Bitcoin to decrypt the contents of the affected computers. > The payment was demanded in bitcoins as this digital currency, popular among cybercriminals, is decentralised, unregulated and impossible to trace. > Though $300 might look very small, multiplied by 300,000, the approximate number of computers affected by WannaCry, the amount becomes humongous. > But the more important cost - the time lost, the files damaged beyond repair and other unexpected collateral damage caused by the malware, will be very difficult to ascertain. How much was demanded? Why in bitcoins?
  • 5. > WannaCry shutdown many businesses across the globe, including the European manufacturing plants of automotive giants Nissan > Healthcare sector was not spared too; Hospitals in UK, including London's Bart Health NHS Trust, had to cut back services, and doctors were forced to turn away patients and cancel appointments, after being forced to shut down equipment to avoid infection. > Though all patients' records and doctors' filed are claimed to be unaffected by WannaCry, one can never be sure. > Overall, organizations are on an overdrive to address these challenges caused by WannaCry: o Disrupted business operations o Risk of losing sensitive or patented information o Financial cost of restoring the systems and data o Dip in organization’s reputation Impact of this attack
  • 6. Were we saved? > Marcus Hutchins, a cyber security analyst, offered a temporary solution for WannaCry ransomware. > He analyzed the code used by the worm and found that it referenced a website URL which didn’t exist. > He bought the domain for $10 and forwarded it to a sinkhole server where it couldn't do any damage. This acted as a ‘kill switch’ to disable the code. > Though this ingenious solution may have saved the day, he claims this is definitely not the end to ransomware problems. > His statement definitely hints that we could be in for a major war with ramsomware hackers. Marcus Hutchins says: “We have stopped this one, but there will be another one coming and it will not be stoppable by us. There’s a lot of money in this. There’s no reason for them to stop. It’s not really much effort for them to change the code and then start over. So there’s a good chance they are going to do it… maybe not this weekend, but quite likely on Monday morning”.
  • 7. > Victims are advised to not encourage the attackers by succumbing to their demands. Also, there is no assurance that the affected files will be decrypted once the ransom is paid. > The best option is to restore the data from backup. If it isn't an option, try decrypting the files using recovery tools. > Work with data recovery experts who can reverse engineer malware and help gain access to your data. > Ransomware usually exploit the most recently discovered loopholes and drawbacks in software systems‘. It is therefore prudent to have the anti-virus and firewall programs always updated, to prevent infections from originating and spreading. If you're a victim, should you pay the ransom?
  • 8. > Though WannaCry may have been stopped for now, it doesn’t mean you’re completely immune to it. > The WannaCry ransomware affects all machines that are using Windows operating system. > A security flaw, originally exploited by the U.S. National Security Agency (NSA), was leaked. It is now being used by hackers to create havoc. If your system runs on Windows OS, it could be at risk. > Experts have predicted that many other ransomware strains will make a round soon. Keep a lookout and secure all your data. > Prevention is always better than cure. So, take all necessary precautions to save yourself from the ransomware attack. Are you at risk?
  • 9. > Here are few tips to protect your computer from WannaCry ransomware. > For individuals and small businesses: o Update your Windows software to the latest edition. o Backing up data is key! Make a copy and secure it. o Scan your systems for viruses and malwares using the latest anti-virus software in the market. > For large organizations: o To protect against WannaCry, apply the latest Microsoft security patches. o Backup all your data and store it in a secure location. o Scan all outgoing and incoming emails with attachments. o Update anti-virus software and conduct regular scans. o Spread awareness among employees to identify scams, malicious links and emails. How to protect yourself?
  • 10. Don’t let WannaCry make you cry! For more information, click here.