SlideShare a Scribd company logo
1 of 28
Download to read offline
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Ransomware: Past, Present, and Future
By A Cyber Security Advisor
NCSC
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
What is the NCSC?
The new National Cyber Security Centre is the UK’s authority on cyber security and
part of GCHQ.
The NCSC brings together cyber security into a single, expert organisation building
on the best of what we already have and combining the functions of:
• CESG
• CERT-UK
• Cyber related aspects of Centre for the Protection of National Infrastructure
• Centre for Cyber Assessment
2
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
3
Where we are based
Cheltenham
London Victoria
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
4
Our Organisation
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
5
What we do:
We understand cyber security:
Sharing our knowledge, we identify and address systemic vulnerabilities
We respond to cyber security incidents:
Managing serious security breaches, we reduce the harm they cause to the UK
We nurture our national cyber security capability:
Providing leadership on critical issues, harnessing talent and technology
We reduce risks to the UK:
We help public and private sector organisations secure their networks
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
About Me: The Details
Over 40 years in the IT Industry:
• Career divided between private and public sectors
• Involved in IT / Cyber security since 2004
• Joined NCSC in 2016
• Work with companies in the Communications, IT Services and Space
sectors of the CNI
• Government Chair of the Space Information Exchange since 2016
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
• The Basics
• How It All Began
• Current Edition
• Back to the Future
• How to Prepare: Now, and in the Future
Ransomware:
Past, Present and Future
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Wikipedia’s definition of ransomware:
“Ransomware is computer malware that installs covertly on a victim's
device (e.g., computer, smartphone, wearable device) and that either
mounts the cryptoviral extortion attack from cryptovirology that holds the
victim's data hostage, or mounts a cryptovirology leakware attack that
threatens to publish the victim's data, until a ransom is paid.”1
In short: an entity renders data or a device inaccessible, then demands
payment for its ‘release’
1 Wikipedia https://en.wikipedia.org/wiki/Ransomware
Ransomware: The Basics
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Purpose: Money!!!!
and relatively lower risk than traditional kidnap, ransom, and
extortion methods.
• Direct Revenue Generation: $1 Billion in 20162
• Top Impacted Countries: United States, Japan, United Kingdom, Italy,
Germany, and Russia3
• Most Prevalent attack vectors: misleading apps, fake antivirus scams4
• Average Ransom Demand: Range between $500-$20005
• Business Costs: $75 Billion per year6
2, 5, 6: Rock, Tracy. “Ransomware Statistics 2016-2017: A Scary Trend in Cyberattacks” February 27, 2017. Invenio IT. http://invenioit.com/security/ransomware-statistics-2016/
3 and 4: Savage, Kevin. Coogan, Peter. Lau, Hon. “The Evolution of Ransomware” August 6, 2015. Symantec.
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf
Ransomware: The Basics
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
The original “kidnap, ransom, and extortion” (KRE) technique
• Used in ancient times for payment, bargaining, warfare
• Still used in parts of the world today
Well-known Cases:
• Richard the Lionheart (1192)
• Charles Lindbergh Jr (1932) – “The Lindbergh Baby”
• Peter Weinberger (1956) – Changed kidnapping laws in US
• Patty Hearst (1974)
Ransomware: How it all began
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Enter Technology:
First known ransomware attack using encryption
• AIDS Trojan (1989) written by Joseph Popp
• Software Expiration Pop-Up Notice
• $189 US Ransom
• Poorly written
• Symmetric Cryptography
Ransomware: How it all began
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Learn and Improve from the mistakes of others
• Adam Young and Moti Yung experiment (1996)
• Encrypt with public key and ransom the private key
• Introduced concept of ‘electronic money’ extortion
Ransomware: How it all began
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Examples of extortion through ransomware:
• Gpcode, Gpcode.AG, Gpcode.AK (varients)
• TROJ.RANSOM.A
• Archiveus
• Krotten
• Cryzip
• MayArchive
As advancing technologies grew, so did the size of encryption keys:
Ransomware: Where it all began
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Four Flavours:
Crypto ransomware Mobile ransomware
Locker ransomware Leakware (aka Doxware)
Ransomware: Current Edition
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Crypto Ransomware:
An infection encrypting data within a computer or system, denying crypto keys
until a ransom is paid.
Ransomware: Current Edition
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
*different to preventing access to files or data, which is crypto ransomware
Ransomware: Current Edition
Locker Ransomware * :
An infection locking a computer or device, denying access until a ransom is
paid.
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Ransomware: Current Edition
Mobile Ransomware:
Blockers; payloads are commonly an APK file installed on user’s mobile to
lock access to the device, or mobile application(s) access. Online
synchronization negates the incentive to encrypt data, so limited to denying
access to mobile use.
*Instances vary based on type of mobile device – i.e., Android vs iOS
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Example: Ashley Maddison
Ransomware: Current Edition
Leakware:
Also known as Doxware: this form of malicious activity combines ‘doxing’ and
ransomware. It combines both encryption of data and the collection/theft of
personal information for the use of future extortion activities.
“…instead of locking up your sensitive data and making them inaccessible to
you, it makes them accessible to everybody – unless you pay up.”7
7 Littlejohn Shinder, Debra. The Evolution of Extortionware. February 7, 2017. GFI Tech Talk. https://techtalk.gfi.com/the-evolution-of-extortionware/
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Technology advances much faster than implementation of security measures.
WannaCry (aka: WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor)
• Date: 12 May 2017 – Present
• Location(s): Everywhere!
• Ransom Demand: $300-$600
• Cause: EternalBlue exploit / Failure to patch
• Damage Thus Far: Over 200K victims and more than 230K
computers infected8
8 https://en.wikipedia.org/wiki/WannaCry_ransomware_attack
Ransomware: Back to the future
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Technology advances much faster than implementation of security measures.
Petya (AKA NotPetya. Varients included Petna, Pneytna, Goldeneye)
• Date: 27 June 2017 onwards
• Location(s):Ukraine: - spreading westward
• Ransom Demand: $300 in bitcoins – but were they after money?
• Cause: EternalBlue exploit / Failure to patch
• Damage thus far: Epicentre was Ukraine, but included UK and US
Ransomware: Back to the future
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Technology advances much faster than implementation of security measures.
“Mr Smith Group”
The US TV network has refused to pay a multimillion dollar ransom
demand to the hackers, who compromised the network’s systems in
July and have since leaked a series of embarrassing documents, emails
and unaired shows, including Game of Thrones and Curb Your
Enthusiasm.
Ransomware: Back to the future
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Evolution and Innovation:
Stealthier: searching for a bigger ‘pay-load’
• Long-term game
• Less about data than entire business
• Infrastructure
• Operations
• E.g. Hospitals, Power Grids
Ransomware: Back to the future
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
Evolution and Innovation:
Stealthier: searching for a bigger ‘pay-load’
• Long-term game
• Less about data than entire business
• Infrastructure
• Manufacture
• Operations
E.g. UK Space Industry
Ransomware: Back to the future
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
What does the “entire business” mean?
Not limited to data sets or system access, but also:
• Incident Response
• Backups
• Restoration/Recovery Operations
Ransomware: Back to the future
Leading to:
Total Organisational Paralysis
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
What you are (hopefully?) doing now:
• Business Risk Assessment
• Data Recovery (backups)
• Detection
• Disaster Recovery Plan
Ransomware: How to prepare –
now
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
What to Do in the Future:
• Dependable Data Recovery Solutions
• Updated Backup Systems
• Cyber Insurance?
• Exercise, Exercise, Exercise!!!!!
• Crypto Currency
Ransomware: How to prepare –
in the future
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
How have you been Impacted? What lessons have you learned?
If not …………….?
Ransomware:
For further information see: https://www.ncsc.gov.uk/guidance/protecting-your-organisation-ransomware
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk
28
For further information see: https://www.ncsc.gov.uk/guidance/protecting-your-organisation-ransomware

More Related Content

What's hot

Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Mongolian legislation and law enforcement in cyberspace by Galbaatar
Mongolian legislation and law enforcement in cyberspace by GalbaatarMongolian legislation and law enforcement in cyberspace by Galbaatar
Mongolian legislation and law enforcement in cyberspace by GalbaatarGalbaatar Lkhagvasuren
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesD. Hill
 
Cyber crime-top-10-affected-countries
Cyber crime-top-10-affected-countriesCyber crime-top-10-affected-countries
Cyber crime-top-10-affected-countriesChandan Kumar
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoTech and Law Center
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
State-encouraged BGP hijacking
State-encouraged BGP hijackingState-encouraged BGP hijacking
State-encouraged BGP hijackingMarco d'Itri
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 

What's hot (19)

Chapter14
Chapter14Chapter14
Chapter14
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Mongolian legislation and law enforcement in cyberspace by Galbaatar
Mongolian legislation and law enforcement in cyberspace by GalbaatarMongolian legislation and law enforcement in cyberspace by Galbaatar
Mongolian legislation and law enforcement in cyberspace by Galbaatar
 
Darknet
DarknetDarknet
Darknet
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
 
Cyber crime-top-10-affected-countries
Cyber crime-top-10-affected-countriesCyber crime-top-10-affected-countries
Cyber crime-top-10-affected-countries
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Dark web
Dark webDark web
Dark web
 
Ley CISPA
Ley CISPALey CISPA
Ley CISPA
 
State-encouraged BGP hijacking
State-encouraged BGP hijackingState-encouraged BGP hijacking
State-encouraged BGP hijacking
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 

Similar to NCSC Speaker

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanMubarak Al Hadadi
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Anthony Arrott
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kkajairo
 

Similar to NCSC Speaker (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6
 

More from Royal United Services Institute for Defence and Security Studies

More from Royal United Services Institute for Defence and Security Studies (20)

Dr Stuart Eves
Dr Stuart Eves   Dr Stuart Eves
Dr Stuart Eves
 
Professor Steve Roberts
Professor Steve RobertsProfessor Steve Roberts
Professor Steve Roberts
 
Air Vice Marshal Stubbs
Air Vice Marshal StubbsAir Vice Marshal Stubbs
Air Vice Marshal Stubbs
 
Air Marshal Leo Davies
Air Marshal Leo DaviesAir Marshal Leo Davies
Air Marshal Leo Davies
 
Colonel (Retd) Thomas X Hammes USMC
Colonel (Retd) Thomas X Hammes USMC Colonel (Retd) Thomas X Hammes USMC
Colonel (Retd) Thomas X Hammes USMC
 
Professor John Louth
Professor John Louth Professor John Louth
Professor John Louth
 
Clive Wright
Clive Wright Clive Wright
Clive Wright
 
Andrew Wilson
Andrew WilsonAndrew Wilson
Andrew Wilson
 
Dr Christina Balis
Dr Christina BalisDr Christina Balis
Dr Christina Balis
 
Mr Simon Fovargue - RUSI Land Warfare Conference 2015
Mr Simon Fovargue - RUSI Land Warfare Conference 2015Mr Simon Fovargue - RUSI Land Warfare Conference 2015
Mr Simon Fovargue - RUSI Land Warfare Conference 2015
 
Mr Claes-Peter Cederlöf - RUSI Land Warfare Conference 2015
Mr Claes-Peter Cederlöf - RUSI Land Warfare Conference 2015Mr Claes-Peter Cederlöf - RUSI Land Warfare Conference 2015
Mr Claes-Peter Cederlöf - RUSI Land Warfare Conference 2015
 
Lieutenant General Timothy Evans - RUSI Land Warfare Conference 2015
Lieutenant General Timothy Evans - RUSI Land Warfare Conference 2015Lieutenant General Timothy Evans - RUSI Land Warfare Conference 2015
Lieutenant General Timothy Evans - RUSI Land Warfare Conference 2015
 
Major General William Hix - RUSI Land Warfare Conference 2015
Major General William Hix - RUSI Land Warfare Conference 2015Major General William Hix - RUSI Land Warfare Conference 2015
Major General William Hix - RUSI Land Warfare Conference 2015
 
Brigadier Richard Toomey - RUSI Land Warfare Conference 2015
Brigadier Richard Toomey - RUSI Land Warfare Conference 2015Brigadier Richard Toomey - RUSI Land Warfare Conference 2015
Brigadier Richard Toomey - RUSI Land Warfare Conference 2015
 
Mr Allan Mallinson - RUSI Land Warfare Conference 2015
Mr Allan Mallinson - RUSI Land Warfare Conference 2015Mr Allan Mallinson - RUSI Land Warfare Conference 2015
Mr Allan Mallinson - RUSI Land Warfare Conference 2015
 
Professor Malcolm Chalmers
Professor Malcolm ChalmersProfessor Malcolm Chalmers
Professor Malcolm Chalmers
 
Professor Trevor taylor
Professor Trevor taylorProfessor Trevor taylor
Professor Trevor taylor
 
Professor Peter Dutton
Professor Peter DuttonProfessor Peter Dutton
Professor Peter Dutton
 
Michael Keegan
Michael KeeganMichael Keegan
Michael Keegan
 
Ishii Masafumi
Ishii MasafumiIshii Masafumi
Ishii Masafumi
 

Recently uploaded

Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 

Recently uploaded (20)

Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 

NCSC Speaker

  • 1. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Ransomware: Past, Present, and Future By A Cyber Security Advisor NCSC
  • 2. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk What is the NCSC? The new National Cyber Security Centre is the UK’s authority on cyber security and part of GCHQ. The NCSC brings together cyber security into a single, expert organisation building on the best of what we already have and combining the functions of: • CESG • CERT-UK • Cyber related aspects of Centre for the Protection of National Infrastructure • Centre for Cyber Assessment 2
  • 3. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk 3 Where we are based Cheltenham London Victoria
  • 4. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk 4 Our Organisation
  • 5. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk 5 What we do: We understand cyber security: Sharing our knowledge, we identify and address systemic vulnerabilities We respond to cyber security incidents: Managing serious security breaches, we reduce the harm they cause to the UK We nurture our national cyber security capability: Providing leadership on critical issues, harnessing talent and technology We reduce risks to the UK: We help public and private sector organisations secure their networks
  • 6. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk About Me: The Details Over 40 years in the IT Industry: • Career divided between private and public sectors • Involved in IT / Cyber security since 2004 • Joined NCSC in 2016 • Work with companies in the Communications, IT Services and Space sectors of the CNI • Government Chair of the Space Information Exchange since 2016
  • 7. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk • The Basics • How It All Began • Current Edition • Back to the Future • How to Prepare: Now, and in the Future Ransomware: Past, Present and Future
  • 8. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Wikipedia’s definition of ransomware: “Ransomware is computer malware that installs covertly on a victim's device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid.”1 In short: an entity renders data or a device inaccessible, then demands payment for its ‘release’ 1 Wikipedia https://en.wikipedia.org/wiki/Ransomware Ransomware: The Basics
  • 9. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Purpose: Money!!!! and relatively lower risk than traditional kidnap, ransom, and extortion methods. • Direct Revenue Generation: $1 Billion in 20162 • Top Impacted Countries: United States, Japan, United Kingdom, Italy, Germany, and Russia3 • Most Prevalent attack vectors: misleading apps, fake antivirus scams4 • Average Ransom Demand: Range between $500-$20005 • Business Costs: $75 Billion per year6 2, 5, 6: Rock, Tracy. “Ransomware Statistics 2016-2017: A Scary Trend in Cyberattacks” February 27, 2017. Invenio IT. http://invenioit.com/security/ransomware-statistics-2016/ 3 and 4: Savage, Kevin. Coogan, Peter. Lau, Hon. “The Evolution of Ransomware” August 6, 2015. Symantec. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf Ransomware: The Basics
  • 10. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk The original “kidnap, ransom, and extortion” (KRE) technique • Used in ancient times for payment, bargaining, warfare • Still used in parts of the world today Well-known Cases: • Richard the Lionheart (1192) • Charles Lindbergh Jr (1932) – “The Lindbergh Baby” • Peter Weinberger (1956) – Changed kidnapping laws in US • Patty Hearst (1974) Ransomware: How it all began
  • 11. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Enter Technology: First known ransomware attack using encryption • AIDS Trojan (1989) written by Joseph Popp • Software Expiration Pop-Up Notice • $189 US Ransom • Poorly written • Symmetric Cryptography Ransomware: How it all began
  • 12. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Learn and Improve from the mistakes of others • Adam Young and Moti Yung experiment (1996) • Encrypt with public key and ransom the private key • Introduced concept of ‘electronic money’ extortion Ransomware: How it all began
  • 13. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Examples of extortion through ransomware: • Gpcode, Gpcode.AG, Gpcode.AK (varients) • TROJ.RANSOM.A • Archiveus • Krotten • Cryzip • MayArchive As advancing technologies grew, so did the size of encryption keys: Ransomware: Where it all began
  • 14. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Four Flavours: Crypto ransomware Mobile ransomware Locker ransomware Leakware (aka Doxware) Ransomware: Current Edition
  • 15. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Crypto Ransomware: An infection encrypting data within a computer or system, denying crypto keys until a ransom is paid. Ransomware: Current Edition
  • 16. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk *different to preventing access to files or data, which is crypto ransomware Ransomware: Current Edition Locker Ransomware * : An infection locking a computer or device, denying access until a ransom is paid.
  • 17. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Ransomware: Current Edition Mobile Ransomware: Blockers; payloads are commonly an APK file installed on user’s mobile to lock access to the device, or mobile application(s) access. Online synchronization negates the incentive to encrypt data, so limited to denying access to mobile use. *Instances vary based on type of mobile device – i.e., Android vs iOS
  • 18. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Example: Ashley Maddison Ransomware: Current Edition Leakware: Also known as Doxware: this form of malicious activity combines ‘doxing’ and ransomware. It combines both encryption of data and the collection/theft of personal information for the use of future extortion activities. “…instead of locking up your sensitive data and making them inaccessible to you, it makes them accessible to everybody – unless you pay up.”7 7 Littlejohn Shinder, Debra. The Evolution of Extortionware. February 7, 2017. GFI Tech Talk. https://techtalk.gfi.com/the-evolution-of-extortionware/
  • 19. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Technology advances much faster than implementation of security measures. WannaCry (aka: WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) • Date: 12 May 2017 – Present • Location(s): Everywhere! • Ransom Demand: $300-$600 • Cause: EternalBlue exploit / Failure to patch • Damage Thus Far: Over 200K victims and more than 230K computers infected8 8 https://en.wikipedia.org/wiki/WannaCry_ransomware_attack Ransomware: Back to the future
  • 20. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Technology advances much faster than implementation of security measures. Petya (AKA NotPetya. Varients included Petna, Pneytna, Goldeneye) • Date: 27 June 2017 onwards • Location(s):Ukraine: - spreading westward • Ransom Demand: $300 in bitcoins – but were they after money? • Cause: EternalBlue exploit / Failure to patch • Damage thus far: Epicentre was Ukraine, but included UK and US Ransomware: Back to the future
  • 21. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Technology advances much faster than implementation of security measures. “Mr Smith Group” The US TV network has refused to pay a multimillion dollar ransom demand to the hackers, who compromised the network’s systems in July and have since leaked a series of embarrassing documents, emails and unaired shows, including Game of Thrones and Curb Your Enthusiasm. Ransomware: Back to the future
  • 22. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Evolution and Innovation: Stealthier: searching for a bigger ‘pay-load’ • Long-term game • Less about data than entire business • Infrastructure • Operations • E.g. Hospitals, Power Grids Ransomware: Back to the future
  • 23. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk Evolution and Innovation: Stealthier: searching for a bigger ‘pay-load’ • Long-term game • Less about data than entire business • Infrastructure • Manufacture • Operations E.g. UK Space Industry Ransomware: Back to the future
  • 24. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk What does the “entire business” mean? Not limited to data sets or system access, but also: • Incident Response • Backups • Restoration/Recovery Operations Ransomware: Back to the future Leading to: Total Organisational Paralysis
  • 25. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk What you are (hopefully?) doing now: • Business Risk Assessment • Data Recovery (backups) • Detection • Disaster Recovery Plan Ransomware: How to prepare – now
  • 26. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk What to Do in the Future: • Dependable Data Recovery Solutions • Updated Backup Systems • Cyber Insurance? • Exercise, Exercise, Exercise!!!!! • Crypto Currency Ransomware: How to prepare – in the future
  • 27. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk How have you been Impacted? What lessons have you learned? If not …………….? Ransomware: For further information see: https://www.ncsc.gov.uk/guidance/protecting-your-organisation-ransomware
  • 28. This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk 28 For further information see: https://www.ncsc.gov.uk/guidance/protecting-your-organisation-ransomware