SlideShare una empresa de Scribd logo
1 de 3
ABOUT.ME/D3PAK
RANSOMWARE
Ransomware type of malware which restricts access to the computer system that it infects, and
demands a ransom paid to the creator(s) of the malware in order for the restriction to be
removed. It deliberately locks you out of your computer or your files, and then demands money
to let you back in.
Some snapshots :
SOME FACTS
 Symantec estimates that nearly 3% of victims end up paying ransoms, which translates
into more than $5 million a year paid to cybercriminals.
 Malware uses the Rijndael algorithm for file encryption. This is a symmetric cipher..
 Some Law enforcement agencies , big giant industries trapped into this
GENERALLY SORTS OF RANSOMWARE
File-encrypting ransomware. Leaves your applications running just fine, but scrambles your data
files so you can't open them any more. This ransomware usually pops up a window offering you
sell you the decryption key.
Lockscreen ransomware. Pops up a window that takes over your computer or mobile device, so
you can't use any other applications, make calls, or run your anti-virus. This ransomware usually
accuses you of some sort of crime, but offers to let you keep on working once you have paid a
"fine."
The good news is that with a bit of technical savvy, or help from a friend that has the savvy, it is
usually possible to work your way past most lockscreen ransomware without paying up.
The bad news is that with most recent file-encrypting ransomware – well-known ones are
CryptoLocker, CryptoWall and TeslaCrypt – there isn't a savvy shortcut.
 Loosely speaking, if you don't have a backup of your scrambled files, you are stuck.
 If the crooks have implemented the encryption process properly, the only way to get
your files back is to to pay them for a copy of the decryption key.
 That means that the malware can scramble your data, but the key needed to
unscramble it never shows up on your computer – not on disk, and not even in memory.
ABOUT.ME/D3PAK
CONCEPT :
The C&C issues a public key for the infected host and are stored with other information in values
under the registry key HKEY_CURRENT_USERSoftwareCryptoLocker_0388. The public key then
seeks a wide range of file extensions on the victim’s machine and further starts the encryption
process. The private key that is used to decryption of the infected files is not saved on the
computer, but on a C&C server.
SOME ARTIFACTS :
 Spawns either ctfmon.exe or svchost.exe (randomly chosen) where its child process
injects its injected own code & sample from %TEMP% folder.
 C:  Documents and Settings  <User>  Application Data  <random name>.exe
 C:  Users  <User>  AppData  Local  <random name>.exe
 KEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “CryptoLocker”
 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce
“*CryptoLocker”
 HKEY_CURRENT_USERSoftwareCryptoLocker
 rack-core.bin .... parse and analyse the files so on
WHAT TO DO?
So the big question, usually left unanswered in technical discussions of ransomware, is, "Should
you pay?"
At a typical price point around $300 to $600 (£200 to £400), ransomware can be expensive.
For better or for worse, most ransomware gangs have acquired a bit of an "honour among
thieves" reputation, so that if you do pay over the money, you almost certainly will get your files
back. On the other hand, law enforcement and security experts are very likely to say, "These are
crooks! This is extortion! If you can possibly take it on the chin, we urge you NOT TO PAY!"
But those are easy words to say if it's not your data on the line.
Interestingly, one reason for not paying extortionists is that there is often no way to ensure that
they won't come back to gouge you for a second payment, or a third, and so on. But, as
described above, modern file-scrambling ransomware doesn't actually steal your files. The
crooks don't have a copy of anything of yours, just the private key to unlock the scrambled files
on your own computer.
ABOUT.ME/D3PAK
In theory, then, once you've paid up, decrypted your files and disinfected the malware, you and
the crooks are back on an even footing, and they can't come back for more.
SOME THIRD PARTY UTILITIES, CONCEPT YOU CAN TWEAK :
1: Restart your system with safe mode
2 :At least update AV, Antimwalware etc and scan
3 :You can install :
 Malwarebytes Anti-Malware
 RogueKiller
 Adwcleaner or Rootkit Remover
4: Scan and delete Ransomeware or maljunks variants
For ex :
 C:Users<YOUR USERNAME>AppDataRoamingRandomFileName.exe
 C:WINDOWSsystem32msctfime.ime
 Delete TEMP/Prefetch folders data
5 : Restore from system volume information(if enabled)
SHOULD YOU PAY?
We're not going to moralise about whether it's always unacceptable to support criminality by
paying up, even if you are in a difficult position. We'll leave you with plainer advice, namely, "It's
OK to pay, but it's much better not to."
So, keep these two points in mind:
 Don't pay if you can possibly avoid it, even if it means some personal hassle.
 Take precautions today (e.g. backup, proactive anti-virus, web and email filtering) so
that you avoid getting into a position where you ever need to pay.
Remember: if you don't have backups and you lose your laptop, you're in the same trouble –
worse, actually – than you would be with ransomware. After all, there's no-one you can pay any
amount of money to in order to get your data back if your hard disk.
In future if you dont want to trap from these kind of nasty stuff , then you need to strengthen your
system security. Do not open suspicious e-mails or uninvited attachment Update the version and
patches of your qualified antivirus program Firewalls (NIDS, IDPS), Use addons related to prevent from
Drive by downloads , droppers or any automated scripts etc. Group Policy Object of the computer to
restrict the registry key (syskey). In Local security policy under Software Restriction Polices define
Additional Rules. Regarding research or reverse eng use isolated architecture environment.
Attachment filters But beware Hackers /Crackers are much smarter. Lots of things are there so as
primary Prevention is better then cure.
Src: Reddit , comodo , naked security, F5 , adlice,bleeping computer
--------------------------------------------------------------------------------------------------------------------------------------------
BE SMART & CREATIVE IN CYBER WORLD
D3pak Kumar
IT Security & Cyber-Forensic
http://in.linkedin.com/in/d3pak/
C|EH , CHFi , ECSA , CCS , CCF , MCA , OPSEC , CSICS , GFSU

Más contenido relacionado

La actualidad más candente

Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

La actualidad más candente (20)

Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Is Your Data Secure?
Is Your Data Secure?Is Your Data Secure?
Is Your Data Secure?
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware Attack
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Wannacry
WannacryWannacry
Wannacry
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanMalware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Backdoor
BackdoorBackdoor
Backdoor
 
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Malware
MalwareMalware
Malware
 

Destacado

Regering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uitRegering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uit
Thierry Debels
 
Pupin formation-puppet-les-bases
Pupin formation-puppet-les-basesPupin formation-puppet-les-bases
Pupin formation-puppet-les-bases
CERTyou Formation
 
AWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant ApplicatonsAWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant Applicatons
Amazon Web Services
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
at MicroFocus Italy ❖✔
 
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancéesAlphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm
 

Destacado (20)

Resolucion 034
Resolucion 034Resolucion 034
Resolucion 034
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Regering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uitRegering lokt fout van prins Laurent bewust uit
Regering lokt fout van prins Laurent bewust uit
 
Pupin formation-puppet-les-bases
Pupin formation-puppet-les-basesPupin formation-puppet-les-bases
Pupin formation-puppet-les-bases
 
ArcServe UDP
ArcServe UDPArcServe UDP
ArcServe UDP
 
Comic1
Comic1Comic1
Comic1
 
Guy Verhofstadt start imagocampagne Molenbeek
Guy Verhofstadt start imagocampagne MolenbeekGuy Verhofstadt start imagocampagne Molenbeek
Guy Verhofstadt start imagocampagne Molenbeek
 
わかる中級英文法 Grammar in Use Unit 89 each and every
わかる中級英文法 Grammar in Use Unit 89 each and everyわかる中級英文法 Grammar in Use Unit 89 each and every
わかる中級英文法 Grammar in Use Unit 89 each and every
 
Good morning wishes with flowers
Good morning wishes with flowersGood morning wishes with flowers
Good morning wishes with flowers
 
The State of Fintech in Japan
The State of Fintech in JapanThe State of Fintech in Japan
The State of Fintech in Japan
 
AWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant ApplicatonsAWS Summit 2011: Designing Fault Tolerant Applicatons
AWS Summit 2011: Designing Fault Tolerant Applicatons
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace MaganhaCLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
 
CLASS 2016 - Rafael Soares
CLASS 2016 - Rafael SoaresCLASS 2016 - Rafael Soares
CLASS 2016 - Rafael Soares
 
Forti cloud
Forti cloudForti cloud
Forti cloud
 
わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3
わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3
わかる中級英文法 Grammar in Use Unit 122 場所を表す前置詞 3
 
わかる中級英文法 Grammar in Use Unit 27 must
わかる中級英文法 Grammar in Use Unit 27 mustわかる中級英文法 Grammar in Use Unit 27 must
わかる中級英文法 Grammar in Use Unit 27 must
 
Dam chuyen 37m wanchai hong kong
Dam chuyen 37m wanchai hong kongDam chuyen 37m wanchai hong kong
Dam chuyen 37m wanchai hong kong
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancéesAlphorm.com Support Formation Sophos UTM les fonctionnalités avancées
Alphorm.com Support Formation Sophos UTM les fonctionnalités avancées
 

Similar a Ransomware

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Discussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docxDiscussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docx
JeniceStuckeyoo
 

Similar a Ransomware (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Discussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docxDiscussion Question Contrast file encryption and volume encryptio.docx
Discussion Question Contrast file encryption and volume encryptio.docx
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

Más de Deepak Kumar (D3)

Más de Deepak Kumar (D3) (20)

Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Forensics
Cyber Forensics Cyber Forensics
Cyber Forensics
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
THINK
THINKTHINK
THINK
 
Cyber Security Tips
Cyber Security TipsCyber Security Tips
Cyber Security Tips
 
CISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAPCISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAP
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
21st Century Cyber Forensics
21st Century Cyber Forensics21st Century Cyber Forensics
21st Century Cyber Forensics
 
Phishing
PhishingPhishing
Phishing
 
IoT
IoTIoT
IoT
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Success Mantra
Success MantraSuccess Mantra
Success Mantra
 
Facebook Security Tips
Facebook Security TipsFacebook Security Tips
Facebook Security Tips
 
DDOS
DDOS DDOS
DDOS
 
Registry Registrar Registrant
Registry Registrar RegistrantRegistry Registrar Registrant
Registry Registrar Registrant
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Ransomware

  • 1. ABOUT.ME/D3PAK RANSOMWARE Ransomware type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed. It deliberately locks you out of your computer or your files, and then demands money to let you back in. Some snapshots : SOME FACTS  Symantec estimates that nearly 3% of victims end up paying ransoms, which translates into more than $5 million a year paid to cybercriminals.  Malware uses the Rijndael algorithm for file encryption. This is a symmetric cipher..  Some Law enforcement agencies , big giant industries trapped into this GENERALLY SORTS OF RANSOMWARE File-encrypting ransomware. Leaves your applications running just fine, but scrambles your data files so you can't open them any more. This ransomware usually pops up a window offering you sell you the decryption key. Lockscreen ransomware. Pops up a window that takes over your computer or mobile device, so you can't use any other applications, make calls, or run your anti-virus. This ransomware usually accuses you of some sort of crime, but offers to let you keep on working once you have paid a "fine." The good news is that with a bit of technical savvy, or help from a friend that has the savvy, it is usually possible to work your way past most lockscreen ransomware without paying up. The bad news is that with most recent file-encrypting ransomware – well-known ones are CryptoLocker, CryptoWall and TeslaCrypt – there isn't a savvy shortcut.  Loosely speaking, if you don't have a backup of your scrambled files, you are stuck.  If the crooks have implemented the encryption process properly, the only way to get your files back is to to pay them for a copy of the decryption key.  That means that the malware can scramble your data, but the key needed to unscramble it never shows up on your computer – not on disk, and not even in memory.
  • 2. ABOUT.ME/D3PAK CONCEPT : The C&C issues a public key for the infected host and are stored with other information in values under the registry key HKEY_CURRENT_USERSoftwareCryptoLocker_0388. The public key then seeks a wide range of file extensions on the victim’s machine and further starts the encryption process. The private key that is used to decryption of the infected files is not saved on the computer, but on a C&C server. SOME ARTIFACTS :  Spawns either ctfmon.exe or svchost.exe (randomly chosen) where its child process injects its injected own code & sample from %TEMP% folder.  C: Documents and Settings <User> Application Data <random name>.exe  C: Users <User> AppData Local <random name>.exe  KEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “CryptoLocker”  HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce “*CryptoLocker”  HKEY_CURRENT_USERSoftwareCryptoLocker  rack-core.bin .... parse and analyse the files so on WHAT TO DO? So the big question, usually left unanswered in technical discussions of ransomware, is, "Should you pay?" At a typical price point around $300 to $600 (£200 to £400), ransomware can be expensive. For better or for worse, most ransomware gangs have acquired a bit of an "honour among thieves" reputation, so that if you do pay over the money, you almost certainly will get your files back. On the other hand, law enforcement and security experts are very likely to say, "These are crooks! This is extortion! If you can possibly take it on the chin, we urge you NOT TO PAY!" But those are easy words to say if it's not your data on the line. Interestingly, one reason for not paying extortionists is that there is often no way to ensure that they won't come back to gouge you for a second payment, or a third, and so on. But, as described above, modern file-scrambling ransomware doesn't actually steal your files. The crooks don't have a copy of anything of yours, just the private key to unlock the scrambled files on your own computer.
  • 3. ABOUT.ME/D3PAK In theory, then, once you've paid up, decrypted your files and disinfected the malware, you and the crooks are back on an even footing, and they can't come back for more. SOME THIRD PARTY UTILITIES, CONCEPT YOU CAN TWEAK : 1: Restart your system with safe mode 2 :At least update AV, Antimwalware etc and scan 3 :You can install :  Malwarebytes Anti-Malware  RogueKiller  Adwcleaner or Rootkit Remover 4: Scan and delete Ransomeware or maljunks variants For ex :  C:Users<YOUR USERNAME>AppDataRoamingRandomFileName.exe  C:WINDOWSsystem32msctfime.ime  Delete TEMP/Prefetch folders data 5 : Restore from system volume information(if enabled) SHOULD YOU PAY? We're not going to moralise about whether it's always unacceptable to support criminality by paying up, even if you are in a difficult position. We'll leave you with plainer advice, namely, "It's OK to pay, but it's much better not to." So, keep these two points in mind:  Don't pay if you can possibly avoid it, even if it means some personal hassle.  Take precautions today (e.g. backup, proactive anti-virus, web and email filtering) so that you avoid getting into a position where you ever need to pay. Remember: if you don't have backups and you lose your laptop, you're in the same trouble – worse, actually – than you would be with ransomware. After all, there's no-one you can pay any amount of money to in order to get your data back if your hard disk. In future if you dont want to trap from these kind of nasty stuff , then you need to strengthen your system security. Do not open suspicious e-mails or uninvited attachment Update the version and patches of your qualified antivirus program Firewalls (NIDS, IDPS), Use addons related to prevent from Drive by downloads , droppers or any automated scripts etc. Group Policy Object of the computer to restrict the registry key (syskey). In Local security policy under Software Restriction Polices define Additional Rules. Regarding research or reverse eng use isolated architecture environment. Attachment filters But beware Hackers /Crackers are much smarter. Lots of things are there so as primary Prevention is better then cure. Src: Reddit , comodo , naked security, F5 , adlice,bleeping computer -------------------------------------------------------------------------------------------------------------------------------------------- BE SMART & CREATIVE IN CYBER WORLD D3pak Kumar IT Security & Cyber-Forensic http://in.linkedin.com/in/d3pak/ C|EH , CHFi , ECSA , CCS , CCF , MCA , OPSEC , CSICS , GFSU