ransomware: on the rise

15

Upload: thesis-scientist-private-limited

Post on 22-Jan-2018

245 views

Category:

Internet


0 download

TRANSCRIPT

Ransomware has been a growing trend for the past two years,

and this is just a culmination, a grand reveal to the wider world of

just how big of a threat it is. But we’ve been writing about this for a while now.

For More Visit Https://WWW.ThesisScientist.com

There are 2 Types of Ransomware in

Circulation:

1. Encryptors, which incorporates advanced encryption

algorithms. It’s designed to block system files and demand payment

to provide the victim with the key that can decrypt the blocked

content

For More Visit Https://WWW.ThesisScientist.com

Examples: Crypto Locker, Locky,

CrytpoWall and more.

For More Visit Https://WWW.ThesisScientist.com

2. Some locker versions infect the Master Boot Record (MBR). The MBR is

the section of a PC’s hard drive which enables the operating system to boot

up. When MBR ransomware strikes, the boot process can’t complete as usual

and prompts a ransom note to be displayed on the screen.

Examples include Satana and Petya

Why Ransomware creators and distributors target businesses:

For More Visit Https://WWW.ThesisScientist.com

• Because that’s where the money is;

• Because attackers know that a successful infection can

cause major business disruptions, which will increase

their chances of getting paid;

• Because computer systems in companies are often

complex and prone to vulnerabilities that can be exploited

through technical means;

For More Visit Https://WWW.ThesisScientist.com

• Because the human factor is still a huge liability which canalso be exploited, but through social engineering tactics;

• Because ransomware can affect not only computers butalso servers and cloud-based file-sharing systems, goingdeep into a business’s core;

• Because cyber criminals know that business would rathernot report an infection for fear or legal consequences andbrand damage.

Most Common infection methods used by Cybercriminals

• Spam email campaigns that contain malicious links or

attachments (there are plenty of forms that malware can use

for disguise on the web);

• Security exploits in vulnerable software;

• Internet traffic redirects to malicious websites;

• Legitimate websites that have malicious codeinjected in their

web pages;

• Drive-by downloads

• Malvertising campaigns;

• SMS messages (when targeting mobile devices);

• Botnets;

• Self-propagation (spreading from one infected computer to

another); WannaCry, for instance, used an exploit kit that

scanned a user’s PC, looking for a certain vulnerability, and

then launched a ransomware attack that targeted it.

• Affiliate schemes in ransomware-as-a-service. Basically, the

developer behind the ransomware earns a cut of the profits

each time a user pays the ransom

For Read Full Presentation Please Visit

Https://www.ThesisScientist.com

WWW.ThesisScientist.com