g data ppt

36
1 THE REAL TRUTH BEHIND RANSOMWARE EDDY WILLEMS – SECURITY EVANGELIST TWITTER: @EDDYWILLEMS

Upload: vulien

Post on 14-Feb-2017

243 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: G DATA PPT

1

THE REAL TRUTH BEHIND

RANSOMWARE

EDDY WILLEMS – SECURITY EVANGELIST

TWITTER: @EDDYWILLEMS

Page 2: G DATA PPT

G DATA Sofware AG:

- Founded 1985 in Germany (Bochum) – First AV Worldwide 1987

- Over 450 Pers. + Offices all over the world + Over 90 countries

- Security software vendor for consumers and companies

WHO?

• Security Evangelist at G Data Sofware AG (Cyber Expert/ Researcher)

• Director of EICAR(+ Co-founder), AMTSO and LSEC (3 int. security industry org.)

• Author of the book ‚Cybergevaar‘ (BE/NL 2013) ‚Cybergefahr‘ (DE 2015)

Page 3: G DATA PPT

RANSOMWARE1.Screen Lockers – 2.Crypto

Blocking device/work

Unusable + encryption

Pay Ransom or loose data/time

=> Time and data critical!

Page 4: G DATA PPT

2015 saw 2,453 reported ransomware

incidents. All in, victims paid out

about $24.1 million total FBI says!

What in 2016???

Horry County Schools to pay hackers’

ransom 8500 US Dollars

Hollywood Hospital 'Victim of Cyber

Attack‘’17.000 US Dollars

THE MONEY PROBLEM

Page 5: G DATA PPT

MEMORIES

Page 6: G DATA PPT

AIDS INFORMATION DISKETTE

1989 PC Cyborg Corporation,

Joseph L. Popp

Diskette with AIDS Information given at

WHO-Conference

Over 20.000 copies via PC World

magazine

Encrypts HD after some reboots

Asked $189 ransom to pay to P.O.Box

in Panama

I was the first to decrypt/solution!

Page 7: G DATA PPT

TODAY’S MALWARE THREATS

400.000 new samples a day

Over 500 million samples => 99,9% not visible!

Page 8: G DATA PPT

MODUS OPERANDI 1

Page 9: G DATA PPT

HOW TO GET INFECTED?

Page 10: G DATA PPT

10

OTHER EXPLOIT KITS

Page 11: G DATA PPT

MODUS OPERANDI 2

Page 12: G DATA PPT

G DATA | SIMPLY SECURE |

Page 13: G DATA PPT

MODUS OPERANDI 3

Page 14: G DATA PPT

SPAMMING MAILS WITH DOCS, ZIP, JAVACRIPT, ETC…

Page 15: G DATA PPT

MODUS OPERANDI 4

Page 16: G DATA PPT

BY THE USE OF A BOTNET

Page 17: G DATA PPT

TRIGGER

Why ransomware

works?

Page 18: G DATA PPT

THE HUMAN FACTOR

Page 19: G DATA PPT

WHEN?

Page 20: G DATA PPT

Easy money?

Page 21: G DATA PPT

WHY IS RANSOMWARE SO DIFFICULT TO DETECT?

It features built-in traffic anonymizers, like TOR and Bitcoin, to avoid tracking by law enforcement agencies and to receive ransom payments

Communication with CC servers is encrypted and difficult to detect in network traffic

It uses anti-sandboxing mechanisms so that antivirus analyzing techniques won’t pick it up

It employs domain shadowing to conceal exploits and hide the communication between the downloader (payload) and the servers controlled by cyber criminals (where the ransomware is stored)

It features Fast Flux, another technique used to keep the source of the infection anonymous (swap the IP addresses constantly and with high frequency by changing DNS records, so that automated analysis mechanisms cannot detect the real source of the infection)

It deploys encrypted payloads which can make it more difficult for antivirus to see that they include malware

It has polymorphic behavior that endows the ransomware with the ability to mutate

It has the ability to remain dormant

Page 22: G DATA PPT

RANSOMWARE

EXAMPLES

Page 23: G DATA PPT

CRYPTO RANSOMWARE EXAMPLES

Page 24: G DATA PPT

G DATA | SIMPLY SECURE | SECURITY SUMMIT | SEPTEMBER 24, 2015 | 24

Page 25: G DATA PPT

KERANGER RANSOMWARE

G DATA | SIMPLY SECURE |

Page 26: G DATA PPT

LINUX.ENCODER RANSOMWARE (FOR WEBSERVERS)

Page 27: G DATA PPT

ANYTHING ELSE?

Page 28: G DATA PPT

Drive-by-downloads!

AND …

Page 29: G DATA PPT

REMEDIATION

Page 30: G DATA PPT

TO PAY

OR

NOT TO PAY?

Page 31: G DATA PPT

REMEDIATION = OLD KNOWN SECURITY TECHNIQUES

- Security package (Endpoint Protection) installed on every system

- Activate or use behavior protection and exploit protection

- Patch Management (PASAP = Patch ASAP)

- Backups (external and not always connected drives)

- Only admin rights for certain users

- Limit user rights on shares or in-the-cloud

- Disable macro’s where not used!

- Mailgateway: filter out all executables (eg. .exe .com .js .htm .scr …etc)

- Mailgateway: use your own filepassing method (eg. zip with specific password)

Page 32: G DATA PPT

G DATABEHAVIOUR BLOCKING

ANTI-EXPLOIT

ANTI-RANSOMWARE

Page 33: G DATA PPT

THE FUTURE?

Page 34: G DATA PPT

IOT: INTERNET OF THINGS – RANSOMWARE ON CARS

Page 35: G DATA PPT

Internet of Things?

IOT

Internet of Trouble!

Page 36: G DATA PPT

G DATA | SIMPLY SECURE | 36

TWITTER: @EDDYWILLEMS

THANK YOU!

Q/A?

A secure solution for mobile threats …