20
1/20 Contents: Basic Introduction and Countermeasures to Ransomware Threats Darwish Ahmad Herati 1 , A.M.Bojamma 2 , Dr.M.P. Indira Gandhi 3 [1]. Department of Computer Science, St. Joseph’s College Bangalore [2]. Assistant Professor, Department of Computer Science, St. Joseph’s College & Research Scholar. Mother Teresa Women’s University [3]. Assistant Professor, Department of Computer Science, Mother Teresa Women’s University. February 17, 2017 St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

Basic introduction and countermeasures to ransomware threats presentation

Embed Size (px)

Citation preview

1/20

Contents:

Basic Introduction and Countermeasures toRansomware Threats

Darwish Ahmad Herati1, A.M.Bojamma2, Dr.M.P. Indira Gandhi3

[1]. Department of Computer Science, St. Joseph’s College Bangalore[2]. Assistant Professor, Department of Computer Science, St. Joseph’s College &

Research Scholar. Mother Teresa Women’s University[3]. Assistant Professor, Department of Computer Science, Mother Teresa

Women’s University.

February 17, 2017

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

2/20

Contents:

Contents

1 Contents:IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

3/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Malware (Malicious Software)

Malware ANY program or file that is harmful to a computer(mobile devices, etc.) user is called Malware or malicioussoftware. That includes viruses, worms, Trojan horses,Spyware etc.

Ransomware!!!

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

4/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Ransomware Diagram:

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

5/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Ransomware Statistics:Countries by Percentage

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

6/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Ransomware Statistics: By types of Ransomware

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

7/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Types of Ransomware:1- Crypto-Ransomware: (Data Locker) Prevent accessto personal files, Encrypting Symmetric, Asymmetric2- Locker-Ransomware: (Computer Locker) Deniesaccess to computer/mobile device/system.

Operating Systems:

Microsoft: Windows Client/Server VersionsLinux: Linux Client/Server Distributions/VersionsOS X: OS X Client/Server VersionsAndroid/iOS: for handhold devices (Phones, Tablets, TVs etc.)

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

8/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Targets of Ransomware

General/ Home UsersBusinesses, Companies and OrganizationsPublic agencies and Government

Systems Affected by Ransomware :Personal ComputersMobile DevicesServers

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

9/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Example of Ransomware: Crypto-Ransomware

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

10/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Example of Ransomware: Crypto-Ransomware

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

11/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Example of Ransomware: Locker-Ransomware

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

12/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Example of Ransomware: Google DriveCrypto-Ransomware

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

13/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

How you get infected:

Propagation Ways:Traffic Distribution System (TDS)Malvertisement (Malware Advertisement)Spam EmailDownloadersSocial Engineering and Self-propagationAffiliate Scheme of SpreadingOther Ways you know...

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

14/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Ransomware Victim Manipulation Techniques:

Economics: Amount of money, type...Psychology: Time limit, Demo of decrypting...Social Engineering: Spreading Techniques, Spam...

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

15/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Countermeasures and Prevention:

Educate Staff and InformUpdate the System and Patching SoftwareUse a layered defense approachEndpoint Security solutionAdvise for mobile/tablet device usersUse Network ProtectionMake Backups and have a Disciplined PlanWorst State: tools to remove, Shadow copies, NoBulletproof solution

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

16/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Suggested Solution:

Use Automatic Snapshot (State Saver) Technology:Hardware-Based and Software BasedHardware-Based: for companies and enterpriseindustries, Government etc.Software-Based: for Home users and personalComputers etc.

Demo!!!

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

17/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Conclusion

Problem Statement:Malwrare: Ransomware: Cryto,LockerOperating Systems: Microsoft, Linux, OS X, Android...

Targets and Propagation

Home Users, Businesses, Public Agencies, Government etc.System Affected: PCs, Mobile Devices, Servers

Countermeasures and Prevention SolutionEducate Staff, Update Systems, Layered/Endpoint Security,Backups

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

18/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Further Research:

Malware Analysis and Reverse Engineering ofRansomware in depth...

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

19/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

References

Hunter Hoffmann, Karthikeyan Ramasamy. (October 26,2016). Beazley project ransomware attack to quadruple in2016.McAfee Lab, (2009). Ransomware-Petya. McAfee LabsThreat Advisory: April 11, 2016.Kevin Savage, Peter Coogan and Hon Lau . (2015).TheEvolution of Ransomware. August 6, 2015etc...

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

20/20

Contents:

IntroductionRansomwareHow you get infectedCountermeasures and PreventionSuggested Solution:ConclusionFurther ResearchReferences

Thank You For YourAttention

St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats