SlideShare una empresa de Scribd logo
1 de 9
Mumbere Joab
RANSOMWARE ATTACKS
Case study: The Reveton Ransomware Attacks
Reveton
What is a Ransomware?
Ransomware is malware for data kidnapping or an exploit in which the
attacker encrypts the victim's data and demands payment for the
decryption key.
Why are Ransomware attacks on the rise?
 Rising Number Of Unemployed I.T Geeks.
As is the case with many crimes committed outside the Internet, money is a
major motivator for many cyber criminals. Especially when the dangers of
criminality are less apparent when you're hiding behind a network, the
perception of low risk and very high financial reward prompts many cyber
criminals to engage in Ransomware attacks
 Weak Organizational policies on privacy and access of I.T Infrastructure.
This is involves granting access to unauthorized people who may end up
using that opportunity to carryout the attack if they are able to access the severs ,
network or even workstations .
 Increasing use of the internet by organizations and individuals
The Increased use the internet by organizations and individuals to store and
share sensitive information creates a favorable conditions for the attackers to lay
there traps because they know how sensitive the information is to victim and
they assured of a big pay at the end of the day while on panics to restore their
information.
 Increasing use of counterfeit software especially in developing countries.
Mostly of these commonly know as Cracks have contain malicious scripts that
can be used to set a Ransomware attack on the users as long as they are
connected on the network
Why are Ransomware attacks on the rise?
 Structurally motivated attacks
Beyond the causes that motivate the attackers, the environment in
which the attack is committed also serves to explain the prevalence of
the phenomenon. While more and more personal and sensitive
information is stored online, this increases the potential rewards for a r
ansom attack. Neither computer security nor applications like email
filters have improved dramatically in terms of coverage. According to
the anti-virus manufacturer Norton, for example, as many as 41 percen
t of computers did not have up-to-date security protection in 2012.
 Personally motivated attacks
The attackers what they do, including their crimes is often the cause of
personal emotions and vendettas. From the disgruntled employee ,
installing a malware on office computers to a jealous boyfriend
hacking into a girlfriend's social media accounts or a teenager taking
down a school website just to prove that he could do it, many cyber
crimes are essentially crimes of passion committed over the Internet.
Many of these crimes, however, can still have very serious impacts and
cause considerable property damage.
What can you do to prevent Ransomware
attacks on your own computer?
• Make sure Your antivirus is updated with a real time protection mechanism and internet
Security plans .
• Always block Pop Ups from your web browsers since most of there attacks are triggered
through unnecessary pop ups.
• Always install updated Software patches from the Operating system venders because they
contain some of these security mechanisms that protect your computer from any possible
attack.
• For Organization they should have a well developed IT policy to restrict access to certain
untrusted sites to avoid any possible attacks.
• A good relationship between the company and IT officers is step number one toward avoid
ing any sorts on intended attacks
• Before you are attacked, a back and recover plan is always paramount for the safety of one
s data. So don’t wait to be attacked and then remember to backup
• Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena
ble one see potentially dangerous files
• If you discover a rogue or unknown process on your machine, disconnect it immediately
from the internet or other network connections such as Wi-Fi this will prevent the infection
from spreading.
How do you think victims should
respond to Ransomware attacks?
 Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you
can realize that it was just a mare attack you find your self paying for what you didn’t
commit .
 Shutdown the infected machine to avoid further encryption of files.
 Disconnect the affected device from the network to a further attack on the other devices
on the network.
 Don’t pay up any amount of money since you already know that the guys are crooks
 Taking to a technician you trust for help.
 Try using boot-time antivirus Sophos Antivirus.
 Clean Up the infected Machine and use a data recovery software to recover your
information.
 For Organization follow the disaster recovery plan it could have a fast solution to avoid ma
ss loss of data and down times.
Do they have an ethical obligation
to future victims?
Yes they do..
 A Backup plan is always necessary before any attack to avoid data loss in case there is an
attack.
 Using an Updated antivirus and anti malware software is necessary to detect and block any
attacks .
 Computer users should avoid using counterfeited software because they are used as honey
ports by attacks.
 Computer users should enable the display of file extensions so that they can be able to tell
which files are dangerous to there computer systems as away to limit chance of being
attacked
 Research is necessary to keep computer users informed about the on going attacks, how
to prevents and solve these attacks in case they are meet.
 Internet users should always avoid responding positively to scareware for these are ways
through which ransom attacks are triggered
Ransomware attacks reveton

Más contenido relacionado

La actualidad más candente

Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computingPatrick Fowler
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 

La actualidad más candente (20)

Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Information security management
Information security managementInformation security management
Information security management
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Similar a Ransomware attacks reveton

Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxTier3MD
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices EyesOpen Association
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 

Similar a Ransomware attacks reveton (20)

Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Synchronized security
Synchronized securitySynchronized security
Synchronized security
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 

Último

%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durbanmasabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburgmasabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Último (20)

%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Ransomware attacks reveton

  • 1. Mumbere Joab RANSOMWARE ATTACKS Case study: The Reveton Ransomware Attacks
  • 3. What is a Ransomware? Ransomware is malware for data kidnapping or an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key.
  • 4. Why are Ransomware attacks on the rise?  Rising Number Of Unemployed I.T Geeks. As is the case with many crimes committed outside the Internet, money is a major motivator for many cyber criminals. Especially when the dangers of criminality are less apparent when you're hiding behind a network, the perception of low risk and very high financial reward prompts many cyber criminals to engage in Ransomware attacks  Weak Organizational policies on privacy and access of I.T Infrastructure. This is involves granting access to unauthorized people who may end up using that opportunity to carryout the attack if they are able to access the severs , network or even workstations .  Increasing use of the internet by organizations and individuals The Increased use the internet by organizations and individuals to store and share sensitive information creates a favorable conditions for the attackers to lay there traps because they know how sensitive the information is to victim and they assured of a big pay at the end of the day while on panics to restore their information.  Increasing use of counterfeit software especially in developing countries. Mostly of these commonly know as Cracks have contain malicious scripts that can be used to set a Ransomware attack on the users as long as they are connected on the network
  • 5. Why are Ransomware attacks on the rise?  Structurally motivated attacks Beyond the causes that motivate the attackers, the environment in which the attack is committed also serves to explain the prevalence of the phenomenon. While more and more personal and sensitive information is stored online, this increases the potential rewards for a r ansom attack. Neither computer security nor applications like email filters have improved dramatically in terms of coverage. According to the anti-virus manufacturer Norton, for example, as many as 41 percen t of computers did not have up-to-date security protection in 2012.  Personally motivated attacks The attackers what they do, including their crimes is often the cause of personal emotions and vendettas. From the disgruntled employee , installing a malware on office computers to a jealous boyfriend hacking into a girlfriend's social media accounts or a teenager taking down a school website just to prove that he could do it, many cyber crimes are essentially crimes of passion committed over the Internet. Many of these crimes, however, can still have very serious impacts and cause considerable property damage.
  • 6. What can you do to prevent Ransomware attacks on your own computer? • Make sure Your antivirus is updated with a real time protection mechanism and internet Security plans . • Always block Pop Ups from your web browsers since most of there attacks are triggered through unnecessary pop ups. • Always install updated Software patches from the Operating system venders because they contain some of these security mechanisms that protect your computer from any possible attack. • For Organization they should have a well developed IT policy to restrict access to certain untrusted sites to avoid any possible attacks. • A good relationship between the company and IT officers is step number one toward avoid ing any sorts on intended attacks • Before you are attacked, a back and recover plan is always paramount for the safety of one s data. So don’t wait to be attacked and then remember to backup • Enable the ‘Show file extensions’ option in the Windows settings on your computer to ena ble one see potentially dangerous files • If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections such as Wi-Fi this will prevent the infection from spreading.
  • 7. How do you think victims should respond to Ransomware attacks?  Don’t Panic :- Ransom attackers all they aim at is to make you panic so that before you can realize that it was just a mare attack you find your self paying for what you didn’t commit .  Shutdown the infected machine to avoid further encryption of files.  Disconnect the affected device from the network to a further attack on the other devices on the network.  Don’t pay up any amount of money since you already know that the guys are crooks  Taking to a technician you trust for help.  Try using boot-time antivirus Sophos Antivirus.  Clean Up the infected Machine and use a data recovery software to recover your information.  For Organization follow the disaster recovery plan it could have a fast solution to avoid ma ss loss of data and down times.
  • 8. Do they have an ethical obligation to future victims? Yes they do..  A Backup plan is always necessary before any attack to avoid data loss in case there is an attack.  Using an Updated antivirus and anti malware software is necessary to detect and block any attacks .  Computer users should avoid using counterfeited software because they are used as honey ports by attacks.  Computer users should enable the display of file extensions so that they can be able to tell which files are dangerous to there computer systems as away to limit chance of being attacked  Research is necessary to keep computer users informed about the on going attacks, how to prevents and solve these attacks in case they are meet.  Internet users should always avoid responding positively to scareware for these are ways through which ransom attacks are triggered