30
How CryptoLocker Still Haunts an LA Wholesale Company Courtesy of FPA Technology Services, Inc. http:// www.TechGuideforLADistributors.com

How CryptoLocker Still Haunts an LA Wholesale Company (SlideShare)

Embed Size (px)

Citation preview

How CryptoLocker Still Haunts

an LA Wholesale Company

Courtesy of FPA Technology Services, Inc.

http://www.TechGuideforLADistributors.com

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

This ransomware and other

forms of extortion are on the

rampage in several forms

and are ready to pounce

on the unwary

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

The CryptoLocker Menace

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

The method of attack used

by the virus was as follows:

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

The virus entered a computer

running Microsoft Windows

by masquerading as an

innocuous email attachment

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Once the link in the email was

clicked, it then encrypted files

anywhere the user had access

to a shared drive

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

making the data in those files

inaccessible to their rightful

owner

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

The owner was threatened

with permanent loss of the data

unless a ransom was paid to

the hackers responsible for

the encryption operation

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

They had 3 days from the point

of infection until the unlock

code was permanently

deleted

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Cyber Extortion –

What Are Your Options?

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Opinions among experts

were divided in the beginning

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Some consultants albeit

unwillingly, said that paying

the ransom was the only way

to get the files back

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Others said that the ransom

should not be paid,

but did not suggest any

other constructive solution

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Over the past few years,

victims who have decided

to pay the ransom together

have paid out an estimated

$3 million to the hackers

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Those who tried to wait it out

while a solution was found

risked the permanent loss of

their files

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Prevention is Better than Cure

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Key protective measures to

start with in such situations are:

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

• Frequent, protected

backups of critical data

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

• Fully up-to-date network

security procedures and

tools

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

• The right level of information

security awareness

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Recently, INTERPOL and other

law enforcement agencies

and security organizations

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

were able to finally seize

the assets of the ransomware

culprits allowing victims to

unencrypt their files without

paying further ransoms

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

There is also no guarantee

of solutions being found for

similar viral infections in

the future

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

What Else is Lying in Wait?

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

CryptoLocker has already

inspired further malware

such as Cryptowall and

TorrentLocker

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Cyber extortion has also been

used against companies with

VoIP (Voice over IP) networks

as well

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Sound IT security procedures

are the only way to eliminate

or at least reduce their effects

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

How do you think an

enterprise should react

to a CryptoLocker or

similar extortion threat?

Sponsored by http://www.TechGuideforLADistributors.com

Craig PollackFounder & CEO

Give us your opinions on

the best way for business

to combat such menaces

in the Comments box below

Copyright © FPA Technology Services, Inc.

Learn How to Boost Your Company’s

Productivity with the Right Technology

Download Your Free Guide

How COOs at Los Angeles Distributors

and Manufacturers Get More Done

Now at http://www.TechGuideforLADistributors.com