SlideShare uma empresa Scribd logo
1 de 11
Ransomware
Trade Association of Information Technology (TAIT)
Knowledge Series
Joel Divekar
Mumbai
18th Nov 2016
What is Ransomware ?
Is a type of Malware,
that infects a computer
&
restricts access to it
until a ransom is paid to unlock it
How did it start ?
In 1989, a floppy disk labelled
“AIDS information – Introductory Diskette”
was distributed to
20,000 participants from 90 countries
after WHO International AIDS conference
And ...
The “AIDS Trojan” transmitted with use floppy disk
got activated after 90 reboots ....
and encrypted all the victim’s data ....
Asking them to pay $189 to an address in Panama
With a message ...
How did it come in my system?
Phishing emails containing malicious attachments
Downloading malicious files
Clicking on malicious ads
Unknowingly visiting an infected website which
downloads and installs malware
Web-based IM applications
Exploiting Web Servers to gain access into an
Organisation’s network
Ransomware after effects
Creates fear and panic
Tricks user to click on links
Ask to pay a Ransom
What happens to infected system
System infected with Ransomware
may also get infected by other malware
In case of Cryptolocker,
the malicious attachment also contains
Uparte, a downloader,
which infects the system with
GameOver Zeus Trojan
which steals users banking information
Should I pay Ransom?
Paying Ransom does not guarantee
that you would get your files back
Decryption of files does not mean
your system is not infected with malware
How2 avoid Ransomware ?
Use tools to filter unwanted mails
Use Ad blockers to block malacious ads
Install Firewall, AntiVirus,
AntiMalware & AntiRansonware
Update and patch system and applications
Most important ... Do daily data backup
Use IT Automation tools extensively
Thanks
Joel Divekar
Mumbai, India
+91 9920208223
joeldivekar.blogspot.com
www.linkedin.com/in/joeldivekar
www.slideshare.net/JoelDivekar
IT Automation / DevOps / Software Development / Training

Mais conteúdo relacionado

Mais procurados

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virusCassidy Lajangang
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 
Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?charliedavibrown
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attackdoiss delhi
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus Ranjeta Muniandy
 

Mais procurados (19)

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?Is your system infected by tatanga trojan?
Is your system infected by tatanga trojan?
 
Wanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awarenessWanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awareness
 
RANSOMWARE
RANSOMWARERANSOMWARE
RANSOMWARE
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Backdoor
BackdoorBackdoor
Backdoor
 
What is Malware?
What is Malware? What is Malware?
What is Malware?
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destaque

11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack 11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack Kris Buytaert
 
Neuswyft presentation 2.12
Neuswyft presentation 2.12Neuswyft presentation 2.12
Neuswyft presentation 2.12Stephen Thompson
 
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyJoel Divekar
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchainEmrah Semiz
 
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...BigchainDB
 
Technology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationTechnology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationVinod Kumar Nerella
 
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlasBitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlasRuben Chavarri
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon
 
Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain SYSPRO
 
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...SlashData
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad SarangNinad Sarang
 
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale InsuranceChain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale InsurancePwC
 
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017BigchainDB
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareRuchi Dass
 
2017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 20172017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 2017PwC
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureMelanie Swan
 

Destaque (20)

11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack 11 Tools for your Open Source devops stack
11 Tools for your Open Source devops stack
 
Neuswyft presentation 2.12
Neuswyft presentation 2.12Neuswyft presentation 2.12
Neuswyft presentation 2.12
 
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...Estonia E-Residency: Country as a Service  - BigchainDB & IPDB Meetup #3 - Fe...
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
 
Technology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentationTechnology tipping points Big Data and Blockchain use case presentation
Technology tipping points Big Data and Blockchain use case presentation
 
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlasBitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
 
Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain Innovation in the Modern Supply Chain
Innovation in the Modern Supply Chain
 
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
 
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
 
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale InsuranceChain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
 
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017 Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and Healthcare
 
2017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 20172017 Top Issues - Financial Reporting Modernization - January 2017
2017 Top Issues - Financial Reporting Modernization - January 2017
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 

Semelhante a Ransomware - TAIT knowledge Series

Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threatsEC-Council
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24Muhammad Zain
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?Sunjoonah Kambbs
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virusShashankRoy11
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against RansomwareKevo Meehan
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 

Semelhante a Ransomware - TAIT knowledge Series (20)

Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Malwares
MalwaresMalwares
Malwares
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Ransomware
RansomwareRansomware
Ransomware
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Ransomware - TAIT knowledge Series

  • 1. Ransomware Trade Association of Information Technology (TAIT) Knowledge Series Joel Divekar Mumbai 18th Nov 2016
  • 2. What is Ransomware ? Is a type of Malware, that infects a computer & restricts access to it until a ransom is paid to unlock it
  • 3. How did it start ? In 1989, a floppy disk labelled “AIDS information – Introductory Diskette” was distributed to 20,000 participants from 90 countries after WHO International AIDS conference
  • 4. And ... The “AIDS Trojan” transmitted with use floppy disk got activated after 90 reboots .... and encrypted all the victim’s data .... Asking them to pay $189 to an address in Panama
  • 6. How did it come in my system? Phishing emails containing malicious attachments Downloading malicious files Clicking on malicious ads Unknowingly visiting an infected website which downloads and installs malware Web-based IM applications Exploiting Web Servers to gain access into an Organisation’s network
  • 7. Ransomware after effects Creates fear and panic Tricks user to click on links Ask to pay a Ransom
  • 8. What happens to infected system System infected with Ransomware may also get infected by other malware In case of Cryptolocker, the malicious attachment also contains Uparte, a downloader, which infects the system with GameOver Zeus Trojan which steals users banking information
  • 9. Should I pay Ransom? Paying Ransom does not guarantee that you would get your files back Decryption of files does not mean your system is not infected with malware
  • 10. How2 avoid Ransomware ? Use tools to filter unwanted mails Use Ad blockers to block malacious ads Install Firewall, AntiVirus, AntiMalware & AntiRansonware Update and patch system and applications Most important ... Do daily data backup Use IT Automation tools extensively
  • 11. Thanks Joel Divekar Mumbai, India +91 9920208223 joeldivekar.blogspot.com www.linkedin.com/in/joeldivekar www.slideshare.net/JoelDivekar IT Automation / DevOps / Software Development / Training