Upload
darwish-ahmad-herati
View
162
Download
4
Embed Size (px)
Citation preview
1/20
Contents:
Basic Introduction and Countermeasures toRansomware Threats
Darwish Ahmad Herati1, A.M.Bojamma2, Dr.M.P. Indira Gandhi3
[1]. Department of Computer Science, St. Joseph’s College Bangalore[2]. Assistant Professor, Department of Computer Science, St. Joseph’s College &
Research Scholar. Mother Teresa Women’s University[3]. Assistant Professor, Department of Computer Science, Mother Teresa
Women’s University.
February 17, 2017
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
2/20
Contents:
Contents
1 Contents:IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
3/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Malware (Malicious Software)
Malware ANY program or file that is harmful to a computer(mobile devices, etc.) user is called Malware or malicioussoftware. That includes viruses, worms, Trojan horses,Spyware etc.
Ransomware!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
4/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Ransomware Diagram:
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
5/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Ransomware Statistics:Countries by Percentage
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
6/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Ransomware Statistics: By types of Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
7/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Types of Ransomware:1- Crypto-Ransomware: (Data Locker) Prevent accessto personal files, Encrypting Symmetric, Asymmetric2- Locker-Ransomware: (Computer Locker) Deniesaccess to computer/mobile device/system.
Operating Systems:
Microsoft: Windows Client/Server VersionsLinux: Linux Client/Server Distributions/VersionsOS X: OS X Client/Server VersionsAndroid/iOS: for handhold devices (Phones, Tablets, TVs etc.)
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
8/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Targets of Ransomware
General/ Home UsersBusinesses, Companies and OrganizationsPublic agencies and Government
Systems Affected by Ransomware :Personal ComputersMobile DevicesServers
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
9/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
10/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
11/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Example of Ransomware: Locker-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
12/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Example of Ransomware: Google DriveCrypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
13/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
How you get infected:
Propagation Ways:Traffic Distribution System (TDS)Malvertisement (Malware Advertisement)Spam EmailDownloadersSocial Engineering and Self-propagationAffiliate Scheme of SpreadingOther Ways you know...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
14/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Ransomware Victim Manipulation Techniques:
Economics: Amount of money, type...Psychology: Time limit, Demo of decrypting...Social Engineering: Spreading Techniques, Spam...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
15/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Countermeasures and Prevention:
Educate Staff and InformUpdate the System and Patching SoftwareUse a layered defense approachEndpoint Security solutionAdvise for mobile/tablet device usersUse Network ProtectionMake Backups and have a Disciplined PlanWorst State: tools to remove, Shadow copies, NoBulletproof solution
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
16/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Suggested Solution:
Use Automatic Snapshot (State Saver) Technology:Hardware-Based and Software BasedHardware-Based: for companies and enterpriseindustries, Government etc.Software-Based: for Home users and personalComputers etc.
Demo!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
17/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Conclusion
Problem Statement:Malwrare: Ransomware: Cryto,LockerOperating Systems: Microsoft, Linux, OS X, Android...
Targets and Propagation
Home Users, Businesses, Public Agencies, Government etc.System Affected: PCs, Mobile Devices, Servers
Countermeasures and Prevention SolutionEducate Staff, Update Systems, Layered/Endpoint Security,Backups
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
18/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
Further Research:
Malware Analysis and Reverse Engineering ofRansomware in depth...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
19/20
Contents:
IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences
References
Hunter Hoffmann, Karthikeyan Ramasamy. (October 26,2016). Beazley project ransomware attack to quadruple in2016.McAfee Lab, (2009). Ransomware-Petya. McAfee LabsThreat Advisory: April 11, 2016.Kevin Savage, Peter Coogan and Hon Lau . (2015).TheEvolution of Ransomware. August 6, 2015etc...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats