O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Ransomware

2.471 visualizações

Publicada em

An in-depth look at Ransomware. Learn what it is, and how to protect yourself.

Publicada em: Tecnologia
  • Login to see the comments

  • Seja a primeira pessoa a gostar disto

Ransomware

  1. 1. 23 September 2014
  2. 2. Chase Cunningham Threat Intelligence Lead • Former Chief Cryptologist for the National Security Agency • US Navy (Ret.) RANSOMWARE Today’s Speaker
  3. 3. • The Threat Landscape • Ransomware: Definition & Reality • Demo: How It Works • Mistakes & Vulnerabilities • Protect Yourself • What No One is Talking About • Questions & Answers RANSOMWARE Agenda
  4. 4. Hackers • Highly Skilled • Well-funded • Sophisticated • Getting Stronger
  5. 5. The Threat Landscape 12 / 13 110 million customers’ credit card and personal data stolen 01 / 14 04 / 14 05 / 14 06 / 14 07 / 14 09 / 14 Exposed Names, addresses, emails & payment card details 145 million users’ passwords affected 1.1 million customers’ credit and debit card data stolen 3 million customers’ credit and debit card data stolen 56 Million Customers Credit Card Data Stolen 180 Southern California Stores hit 08 / 14 Nude Photos of Actresses Revealed to the Public 09 / 14 08 / 14 Social Security #s & Personal Data of 4.5 Million People 09 / 14 4.93 Million Gmail User Names and Passwords Published Who’s Next? ? Customer Data Theft from 33 Locations
  6. 6. Ransomware Defined • Malware locks out system owners & demands ransom • Creates “zombie computer” operated remotely • Individuals & businesses targeted • On the rise past 3 years • CryptoLocker procured estimated US $3 million
  7. 7. Ransomware Reality: Code Spaces • Hosted by a major cloud provider • Pirates held site for $millions • Unable to pay; pirates deleted files • Company filed for bankruptcy • Cloud provider had no liability I always call it the Wal-Mart/Target competition… to see who can get to the lowest price and still provide good service. Security is what gets lost. “ “ - Jeff Schilling FireHost CSO, SearchSecurity.com
  8. 8. DEMO
  9. 9. “ The Results “ You Owe What We Say You Owe
  10. 10. MISTAKE: Taking an ostrich approach: “It won't happen to me” VULNERABI L I TY EVERYONE can be successfully breached RANSOMWARE
  11. 11. RANSOMWARE MISTAKE: Wasting resources on the wrong areas VULNERABI L I TY High-risk areas vulnerable to easy attack
  12. 12. RANSOMWARE MISTAKE: Using an insecure provider VULNERABI L I TY Your business & customers
  13. 13. Protecting Yourself • Security is a 24/7 job • Get a secure provider • Multi-layered security • Security operations
  14. 14. RANSOMWARE
  15. 15. PROTECT DETECT RESPOND RECOVER RANSOMWARE
  16. 16. What No One is Talking About:
  17. 17. Questions & Answers RANSOMWARE
  18. 18. Thank You Please visit us at FireHost.com Email sales@firehost.com Phone +1 877 262 3473 RANSOMWARE

×