1. SHEKHAWATI INSTITUTE OF
ENGINEERING AND
TECHNOLOGY
A Seminar Presentation
On
RANSOMWARE
Submitted to:-
Mrs. Suman Singh
HOD of CSE Dept.
Submitted by:-
Vikash Saini
B.Tech CSE 8th sem
2. CONTENTS
What is Ransomware?
Impact of this attack
Some Facts About Ransomware
Bitcoins
TOR (Anonymity Network)
If you're a victim, should you pay the ransom?
Ransomware infection
How to protect yourself?
Conclusion
3. WHAT IS RANSOMWARE?
It is a type of malware that restricts access to the
infected computer system in some way, and demands
that the user pay a ransom to the malware operators to
remove the restriction.
This malware locked all the data in the computer and
displayed a message.
demanding a ransom in exchange to unblock the data.
4.
5. IMPACT OF THIS ATTACK
WannaCry shutdown many businesses across the globe, including
the European manufacturing plants of automotive giants Nissan
$17,000 Amount paid by the Hollywood Presbyterian Medical
Center in 2016 to unlock files and return to business as usual.
209 million Amount paid in 2016 to cyber-criminals using
ransomware
6. On 12 May 2017, a massive ransomware attack
occurred across a wide range of sectors, including
health care, government, telecommunications and
gas.
WannaCry has spread to over 300,000 systems in
over 150 countries
7. Some Facts About Ransomware
TYPICAL RANSOMWARE SOFTWARE USES RSA
2048 ENCRYPTION TO ENCRYPT FILES.
AN AVERAGE DESKTOP COMPUTER IS
ESTIMATED TO TAKE AROUND 6.4
QUADRILLION YEARS TO CRACK AN RSA 2048
KEY.
8. BITCOINS
Bitcoins are a form of cryptocurrency, meaning
they do not have a physical representation.
they are stored in anonymous digital wallets.
They can be transferred anywhere in the world via
the Internet. They can be paid from anywhere, to
anywhere with total anonymity.
9. TOR (ANONYMITY NETWORK)
TOR, which stands for “The Onion Router” is a network
and browser developed to enhance and anonymize
Internet traffic.
All traffic is encrypted .
developed by the U.S. Naval Research Laboratory and
Defense Advanced Research Projects Agency (DARPA).
10. IF YOU'RE A VICTIM, SHOULD YOU
PAY THE RANSOM?
Never pay Ransom.
The best option is to restore the data from backup.
try decrypting the files using recovery tools.
Work with data recovery experts who can reverse engineer
malware and help gain access to your data.
11. RANSOMWARE INFECTION
Opens an infected email attachment
Clicks on an infected link
Installs an infected app – from a third-party app store
Visits a legitimate website that has been infected
12. HOW TO PROTECT YOURSELF?
Update your Windows software to the latest edition.
Backing up data is key! Make a copy and secure it.
Scan your systems for viruses and malwares using the latest
anti-virus software in the market.
To protect against WannaCry, apply the latest Microsoft
security patches.
13. Backup all your data and store it in a secure
location.
Scan all outgoing and incoming emails with
attachments.
Update anti-virus software and conduct regular
scans.
Spread awareness among employees to identify
scams, malicious links and emails.
Segment the company network
14. CONCLUSION
Ransomware is a type of malicious
software from cryptovirology that threatens to publish the
victim's data or perpetually block access to it unless a ransom is
paid
more advanced malware uses a technique called cryptoviral
extortion, in which it encrypts the victim's files, making them
inaccessible, and demands a ransom payment to decrypt them.