SlideShare una empresa de Scribd logo
1 de 11
Ransomware
Trade Association of Information Technology (TAIT)
Knowledge Series
Joel Divekar
Mumbai
18th Nov 2016
What is Ransomware ?
Is a type of Malware,
that infects a computer
&
restricts access to it
until a ransom is paid to unlock it
How did it start ?
In 1989, a floppy disk labelled
“AIDS information – Introductory Diskette”
was distributed to
20,000 participants from 90 countries
after WHO International AIDS conference
And ...
The “AIDS Trojan” transmitted with use floppy disk
got activated after 90 reboots ....
and encrypted all the victim’s data ....
Asking them to pay $189 to an address in Panama
With a message ...
How did it come in my system?
Phishing emails containing malicious attachments
Downloading malicious files
Clicking on malicious ads
Unknowingly visiting an infected website which
downloads and installs malware
Web-based IM applications
Exploiting Web Servers to gain access into an
Organisation’s network
Ransomware after effects
Creates fear and panic
Tricks user to click on links
Ask to pay a Ransom
What happens to infected system
System infected with Ransomware
may also get infected by other malware
In case of Cryptolocker,
the malicious attachment also contains
Uparte, a downloader,
which infects the system with
GameOver Zeus Trojan
which steals users banking information
Should I pay Ransom?
Paying Ransom does not guarantee
that you would get your files back
Decryption of files does not mean
your system is not infected with malware
How2 avoid Ransomware ?
Use tools to filter unwanted mails
Use Ad blockers to block malacious ads
Install Firewall, AntiVirus,
AntiMalware & AntiRansonware
Update and patch system and applications
Most important ... Do daily data backup
Use IT Automation tools extensively
Thanks
Joel Divekar
Mumbai, India
+91 9920208223
joeldivekar.blogspot.com
www.linkedin.com/in/joeldivekar
www.slideshare.net/JoelDivekar
IT Automation / DevOps / Software Development / Training

Más contenido relacionado

La actualidad más candente

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
Angel Sophie
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 

La actualidad más candente (19)

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?
 
Wanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awarenessWanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awareness
 
RANSOMWARE
RANSOMWARERANSOMWARE
RANSOMWARE
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Backdoor
BackdoorBackdoor
Backdoor
 
What is Malware?
What is Malware? What is Malware?
What is Malware?
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destacado

Neuswyft presentation 2.12
Neuswyft presentation 2.12Neuswyft presentation 2.12
Neuswyft presentation 2.12
Stephen Thompson
 

Destacado (20)

11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack 11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack
 
Neuswyft presentation 2.12
Neuswyft presentation 2.12Neuswyft presentation 2.12
Neuswyft presentation 2.12
 
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
 
Technology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationTechnology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentation
 
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlasBitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
 
Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain
 
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
 
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale InsuranceChain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
 
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and Healthcare
 
2017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 20172017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 2017
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 

Similar a Ransomware - TAIT knowledge Series

External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
Souman Guha
 

Similar a Ransomware - TAIT knowledge Series (20)

Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Malwares
MalwaresMalwares
Malwares
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Ransomware
RansomwareRansomware
Ransomware
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Ransomware - TAIT knowledge Series

  • 1. Ransomware Trade Association of Information Technology (TAIT) Knowledge Series Joel Divekar Mumbai 18th Nov 2016
  • 2. What is Ransomware ? Is a type of Malware, that infects a computer & restricts access to it until a ransom is paid to unlock it
  • 3. How did it start ? In 1989, a floppy disk labelled “AIDS information – Introductory Diskette” was distributed to 20,000 participants from 90 countries after WHO International AIDS conference
  • 4. And ... The “AIDS Trojan” transmitted with use floppy disk got activated after 90 reboots .... and encrypted all the victim’s data .... Asking them to pay $189 to an address in Panama
  • 6. How did it come in my system? Phishing emails containing malicious attachments Downloading malicious files Clicking on malicious ads Unknowingly visiting an infected website which downloads and installs malware Web-based IM applications Exploiting Web Servers to gain access into an Organisation’s network
  • 7. Ransomware after effects Creates fear and panic Tricks user to click on links Ask to pay a Ransom
  • 8. What happens to infected system System infected with Ransomware may also get infected by other malware In case of Cryptolocker, the malicious attachment also contains Uparte, a downloader, which infects the system with GameOver Zeus Trojan which steals users banking information
  • 9. Should I pay Ransom? Paying Ransom does not guarantee that you would get your files back Decryption of files does not mean your system is not infected with malware
  • 10. How2 avoid Ransomware ? Use tools to filter unwanted mails Use Ad blockers to block malacious ads Install Firewall, AntiVirus, AntiMalware & AntiRansonware Update and patch system and applications Most important ... Do daily data backup Use IT Automation tools extensively
  • 11. Thanks Joel Divekar Mumbai, India +91 9920208223 joeldivekar.blogspot.com www.linkedin.com/in/joeldivekar www.slideshare.net/JoelDivekar IT Automation / DevOps / Software Development / Training