ransomware dataencryption made easy
play

Ransomware: DataENcryption made easy The Word Ransom = Ransom - PowerPoint PPT Presentation

Ransomware: DataENcryption made easy The Word Ransom = Ransom Blackmailing History 1989 AIDS TROJAN DISK distributed/infected via floppy disk developer was caught and put into jail 2005 first internet attack


  1. Ransomware: „DataENcryption made easy“

  2. The Word ● “Ransom” = Ransom ● Blackmailing

  3. History

  4. 1989 AIDS TROJAN DISK distributed/infected via floppy disk developer was caught and put into jail

  5. 2005 first internet attack “TROJ_PGPCODER.A” couple of hundred $ ransom

  6. Today

  7. A lot of infections

  8. In the meantime (big) companies affected

  9. ¼ of the people pay the ransom (estimated number of unknown cases higher) [0] [0]Source: http://www.gulli.com/news/13828-umfrage-zu-ransomware-rund-ein-viertel-wuerde-loesegeld-zahlen-2010-07-17

  10. Different versions of Ransomware A Selection ● Locky ● TeslaCrypt ● CryptoWall 4.0 ● Petya ● Cerber ● CTB-Locker Rot: No Decrypter available Grün: Decrypter available

  11. Ransomware in reality http://www.heise.de/newsticker/meldung/Ransomware-US-Krankenhaus-zahlt-40-Bitcoins- Loesegeld-3109956.html

  12. current Ransomware: Popcorn Time Source: https://futurezone.at/digital-life/ransomware-gibt-daten-frei-wenn-man-freunde-infiziert/235.465.376

  13. current Ransomware: Goldeneye Source: http://www.golem.de/news/petya-variante-goldeneye-ransomware-verschickt-ueberzeugende-bewerbungen-1612-124940.html

  14. WannaCry?!

  15. Source: https://imgur.com/gallery/tbyUCBW

  16. A guide to getting infected ☣

  17. Example email, with links to Ransomware Source: https://www.uni-siegen.de/it-sicherheit/aktuelles/676053.html

  18. Office (Word) Macro

  19. Example of Word-Macro Malware Bildquelle:http://arstechnica.com/security/2016/03/its-2016-so-why-is-the-world-still-falling-for-office-macro-malware/

  20. Example of Word-Macro Malware Bildquelle:http://arstechnica.com/security/2016/03/its-2016-so-why-is-the-world-still-falling-for-office-macro-malware/

  21. PDF Through security holes in PDF format. often exploited using unknown “zero-day”

  22. Adobe Flash (Player)

  23. (Java) Drive by Attack

  24. What happens exactly? ● Different methods ● Different data extensions encrypted ● Blackmailing message ● Optional: Countdown ● Deletion of data ● Possible: blackmail with data

  25. How it is encrypted? • Files → symmetric with AES • AES Key → RSA Public Key • On Server → RSA Private Key Other way of encryption also possible! Petya/Goldeneye → File System Table & MBR

  26. How to protect?

  27. Backups

  28. Various ways of Backups ● Single Files ● Image ● incremental ● Remote Backups on fileserver ● Differential

  29. Think about ● Software Licenses ● Userprofile of programs – Firefox – Thunderbird ● passwords

  30. Copies of the files on the local computer are not safe. Also not on a another partition of the same HDD!

  31. Test your backup! In worst case restoring the backup doesn't works testing is essential!

  32. Software recommendation ● Paragon Backup & Recovery 14 Free ● Areca Backup ● AOMEI Backupper ● Windows internal Backuptool

  33. Up-to-date anti virus (AV) software

  34. Up-to-date Operating System + Browser + programs (Adobe PDF)

  35. Turn on windows file extensions

  36. Deactivate Adobe Flash better: uninstall

  37. Email + attachment mistrust

  38. No administrator privileges! Work with limited user privileges Doesn’t protect from Ransomware! Data will still be encrypted provides false security

  39. no plugging in of (Un)known Flash drives

  40. You can check suspicious files online https://www.virustotal.com Don’t upload private data!

  41. Use Linux! Userfriendly Systems: - Ubuntu - Linux Mint

  42. Backup? Backup BACKUP!

  43. Summary Infected, what to do? 1) Turn off computer immediately 2) Boot live System (from flash drive/CD/DVD) 3) Detect Ransomware type 4) Rescue data 5) Reinstall OS 6) Restore Backup

  44. Questions?

  45. Further Sources & Informationen (German/English) https://ransomware.at/ https://github.com/ytisf/theZoo

  46. Creator CC-BY: Hetti – https://twitter.com/Th3PeKo

Recommend


More recommend