RANSOMWARE
CYBER SECURITY
Overview
Below is what we will be going over in our presentation.
Introduction of Ransomware.
Background and history of Ransomware.
Types of Ransomware attacks.
What you can do to protect yourself from Ransomware.
Backup and DR planning.
Real world examples of Ransomware.
What is Ransomware?
One of the most prominent and fast growing threats
which:
1.Takes users files
2. Encrypts them
3. And creates a decryption key
This makes the user’s files inaccessible until
some sort of Ransom is paid.
Two main types of Ransomware.
1. Encryptors- which incorporate encryption algorithm s to black system files and demand
some sort of payment to be able to access the key to decrypt victims files.
2. Locker – completely locks users out of their devices by not allowing them to or locking
them out of their operating system until the desired ransom is paid.
History of Ransomware
It’s been said that Ransomware was introduced as an AIDS Trojan in 1989 when Harvard-
educated biologist Joseph L. Popp sent 20,000 compromised diskettes named “AIDS Information –
Introductory Diskettes” to attendees of the internal AIDS conference organized by the World
Health Organization. The Trojan worked by encrypting the file names on the customers’ computer
and hiding directories. The victims were asked to pay $189 to PC Cyborg Corp. at a mailbox in
Panama.
From 2006 and on, cybercriminals have become more active and started using asymmetric RSA
encryption. They launched the Archives Trojan that encrypted the files of the My Documents
directory. Victims were promised access to the 30-digit password only if they decided to purchase
from an online pharmacy.
After 2012, ransomware started spreading worldwide, infecting systems and transforming into
more sophisticated forms to promote easier attack delivery as the years rolled by. In Q3, about
60,000 new ransomware was discovered, which doubled to over 200,000 in Q3 of 2012.
The first version of CryptoLocker appeared in September 2013 and the first copycat software
called Locker was introduced in December of that year.
Ransomware has been creatively defined by the U.S. Department of Justice as a new model of
cybercrime with a potential to cause impacts on a global scale. Stats indicate that the use of
ransomware is on a steady rise and according to Veeam, businesses had to pay $11.7 on
average in 2017 due to ransomware attacks. Alarmingly, the annual ransomware-induced costs,
including the ransom and the damages caused by ransomware attacks, are most likely to shoot
beyond $11.5 billion by 2019
Birth and Evolution of Ransomware
Early Years
1. Born in 1989 and given the name “AIDS”
2. Focused attacks primarily in the healthcare industry
3. Encrypted files on a system and demanded ransom to decrypt them
Evolution and Adaptability
1. Utilization of more sophisticated algorithms such as RSA
2. Usage and ransom of cryptocurrencies like bitcoin to maintain anonymity.
3. Pre-built infrastructures and AES-256 encryption promote wide distribution.
Types of Ransomware Attacks
Locker Ransomware
Deny access to computing resources.
Locks computer
Displays official message
Limits user’s capabilities
Crypto Ransomware
Find and encrypt valuable data stored on user’s computer
Makes data useless
Computer does not have limited access
Attacker uses information to extort the user into giving them money
Jigsaw Ransomware
Encrypts important information
Starts deleting the files until ransom is paid
72 hour mark and the user loses all their information
KeRanger Ransomware
Encrypt Mac users backup files
Not able to recover anything
Ransom of about $400
WannaCry
Encrypts user’s data
Ransom of about $300 using Bitcoins
Increases ransom or delete the user’s files stored in the computer
How Ransomware works
Ransomware is a prominent and
fast growing threat which takes
user files, encrypts them and
creates decryption key making
the user’s files inaccessible until
some sort of ransom is paid
Ransomware attacks work in
that malware sent from the
hacker can be spread through
malicious email attachments,
infected external storage
devices and websites that are
compromised
Anatomy of ransomware attack
A ransomware attack is a multi-step process. If the proper defenses are in place
at the various steps of the attack, the impact can be greatly reduced.
Delivery and exploit: Ransomware is delivered through a certain mechanism
(e.g.: phishing) and finds a vulnerability or a victim to attack
Install and disarm: Ransomware installs itself and lower the security poster of the
victim machine
Occupy and encrypt: Establish communication with the command and control
server and encrypt data files and mapped drivers
Demand ransom: Users attempt to access files and are alerted that the data has
been encrypted
Decrypt: Decryption keys will only be provided on payment of a ransom
Secure and Protect
On the computer
Do not store important data
Backup important files
After usage, disconnect from the cloud
In the Browser
Remove plugins from your browser
Adjust browser’s security settings
Use an ad blocker
Security Tools
Have a real time scanner
Have your firewall on
Use internet security suite’s
Online
Do not open spam emails
Never download attachments from spam email
Only open emails from known recipients
Infected?
Disconnect your computer
Contact and IT professional
Report the crime
If absolutely necessary, pay the ransom
Why backup testing & Having a DR plan
Many organizations recognize the need for a disaster recovery plan;
however the majority don’t have one in place. Those that have a DR
plan often don’t test it.
• 80% of U.S. companies lack a DR plan
• 50% of small and midsized businesses (SMBs) worldwide have no DR plan
• 72% of SMBs worldwide that have a DR plan have never tested it
• 25% of reported DR tests fail
So why aren’t DR plans being tested, or being tested more often?
• 40% of SMBs fear that DR testing will impact their business operations and
their customers
• 27% of SMBs fear disruption to their sales and revenue
• 48% of SMBs claim that they lack the resources to test their DR plans on a
regular basis
Building a disaster recovery plan
Disaster recovery planning is the plan put in place to recover from a
disaster or interruption of key services. The business continuity plan
includes:
Creating of business continuity and disaster recovery policy
Business impact analysis
Classification of operations and criticality analysis
Development of a business continuity plan and disaster
recover procedures
Training and awareness, Testing
Ongoing Monitoring
Know your environment and SLA’S
• Recovery point objectives
• How much lost data can you afford?
• Data size/change rate (i.e. what is feasible?)
• Recovery time objectives
• How long can you afford to be down?
• SLA’s Determine Which Cloud Provider
• Depending on the recovery time, 4 different ways to choose: 3RD
Party Cloud, Replication, DRaaS or Manufacturers Cloud
Real world examples of Ransomware