SlideShare uma empresa Scribd logo
1 de 7
“Cyber criminals are not just malicious...They’re business-
oriented and seek to cash out on their efforts.
That’s why, after testing ransomware on home users and
evaluating the impact, they moved onto bigger targets:
police departments, city councils and even schools and,
worse, hospitals!”
heimdalsecurity.com
Because public institutions, manage huge databases of personal and
confidential information that cyber criminals can sell
Because these institutions ofttimes lack cyber defenses that can protect them
against ransomware
Because the staff is not trained to spot cyber attacks (ransomware often
leverages the human factor weakness to trigger the infection)
Because public institutions often use outdated software and equipment, which
means that their computer systems are packed with security holes just
begging to be exploited
Because ransomware has a big impact on conducting usual activities, causing
huge disruptions
heimdalsecurity.com
Why do ransomware creators and distributors target public institutions?
Victims are hacked by clicking on an innocuous looking attachment or website link within an email. This
releases malicious software that disables the victim’s computer system and computers on the same
network.
Ransom notes then appear across the network demanding money paid in Bitcoin in return for a decryption
key that will disable the virus. There is no guarantee that the key will work or prevent further attacks.
St Louis Public Library Computers Inoperable
ST. LOUIS, MO (KTVI) – All computers at St. Louis
Public Library locations are inoperable. The library says
that they have been hacked and over 700 computers at
16 branches computers are being held for ransom.
"It's been a very sophisticated attack on our system,"
library executive director Waller McGuire said. "The
library is not going to pay a ransom to open up its
computers, so we didn't go that far."
According to the library, hackers demanded $35,000 in the electronic currency Bitcoin -- but the
library refuses to pay. Instead, it'll wipe the entire computer system and reset it, which could take
days or weeks. The entire checkout system is on hold. No one can walk out with any of the
library's 4 million books, magazines and videos. And all computers are frozen.
“Trust No One. Literally”
1. Keep system and antivirus patched and updated. Utilize pop-up blockers.
2. Scrutinize links contained in e-mails and do not open attachments included in
unsolicited e-mails. Software should only be downloaded from trusted sites.
3. Back up data, make sure it is not accessible by computers. Some ransomware
has the capability to lock cloud-based backups when systems continuously
back up in real-time.
4. If you discover a rogue or unknown process on your machine, disconnect it
immediately from the internet or other network connections, and shut it down.
5. Scareware impersonates AV and can be ignored, Screenlockers lock a
machine up with a full screen message, but encrypting Ransomware “is the
truly nasty stuff”.

Mais conteúdo relacionado

Mais procurados

Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
Akhil Kumar
 

Mais procurados (20)

International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Intranets and Extranets
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Building a strong security strategy
Building a strong security strategyBuilding a strong security strategy
Building a strong security strategy
 
call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
Ijcis -->cfp
Ijcis -->cfp Ijcis -->cfp
Ijcis -->cfp
 
Ijisa
IjisaIjisa
Ijisa
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 

Destaque

Destaque (6)

Meraki Wi-Fi Statistics
Meraki Wi-Fi StatisticsMeraki Wi-Fi Statistics
Meraki Wi-Fi Statistics
 
TSCPL: Library of the Year
TSCPL: Library of the YearTSCPL: Library of the Year
TSCPL: Library of the Year
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 

Semelhante a Ransomware

Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
 

Semelhante a Ransomware (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 

Mais de Northeast Kansas Library System

Mais de Northeast Kansas Library System (20)

Disaster Asset Library.pptx
Disaster Asset Library.pptxDisaster Asset Library.pptx
Disaster Asset Library.pptx
 
Emergency Action Planning and Continuity of Operations KLA.pptx
Emergency Action Planning and Continuity of Operations KLA.pptxEmergency Action Planning and Continuity of Operations KLA.pptx
Emergency Action Planning and Continuity of Operations KLA.pptx
 
Census 2020 webinar
Census 2020 webinarCensus 2020 webinar
Census 2020 webinar
 
Designing The OPAC: A Rebrand
Designing The OPAC: A RebrandDesigning The OPAC: A Rebrand
Designing The OPAC: A Rebrand
 
Storyboarding for Better Design
Storyboarding for Better DesignStoryboarding for Better Design
Storyboarding for Better Design
 
Your ILS
Your ILSYour ILS
Your ILS
 
Anna foote super volunteers presentation
Anna foote   super volunteers presentationAnna foote   super volunteers presentation
Anna foote super volunteers presentation
 
Sarah thiel broaden your reach!!
Sarah thiel   broaden your reach!!Sarah thiel   broaden your reach!!
Sarah thiel broaden your reach!!
 
Tech Lab: Module 1
Tech Lab:  Module 1Tech Lab:  Module 1
Tech Lab: Module 1
 
Telemedicine & Telehealth in KS
Telemedicine & Telehealth in KSTelemedicine & Telehealth in KS
Telemedicine & Telehealth in KS
 
Capturing Stories with Kaye McIntyre
Capturing Stories with Kaye McIntyreCapturing Stories with Kaye McIntyre
Capturing Stories with Kaye McIntyre
 
Libraries: 5 ways to maximize internet
Libraries:  5 ways to maximize internet Libraries:  5 ways to maximize internet
Libraries: 5 ways to maximize internet
 
Advocacy with a big A
Advocacy with a big A Advocacy with a big A
Advocacy with a big A
 
Collecting statistics from the unifi wireless controller
Collecting statistics from the unifi wireless controllerCollecting statistics from the unifi wireless controller
Collecting statistics from the unifi wireless controller
 
Techopics
TechopicsTechopics
Techopics
 
E rate Explained - 2015
E rate Explained - 2015E rate Explained - 2015
E rate Explained - 2015
 
State Library of Kansas Statewide Resources Overview
State Library of Kansas Statewide Resources OverviewState Library of Kansas Statewide Resources Overview
State Library of Kansas Statewide Resources Overview
 
Book Whisperers: Getting Kids Excited About Reading
Book Whisperers: Getting Kids Excited About ReadingBook Whisperers: Getting Kids Excited About Reading
Book Whisperers: Getting Kids Excited About Reading
 
Measuring What Matters
Measuring What MattersMeasuring What Matters
Measuring What Matters
 
Are You Doing This? (revised)
Are You Doing This? (revised)Are You Doing This? (revised)
Are You Doing This? (revised)
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Ransomware

  • 1.
  • 2. “Cyber criminals are not just malicious...They’re business- oriented and seek to cash out on their efforts. That’s why, after testing ransomware on home users and evaluating the impact, they moved onto bigger targets: police departments, city councils and even schools and, worse, hospitals!” heimdalsecurity.com
  • 3. Because public institutions, manage huge databases of personal and confidential information that cyber criminals can sell Because these institutions ofttimes lack cyber defenses that can protect them against ransomware Because the staff is not trained to spot cyber attacks (ransomware often leverages the human factor weakness to trigger the infection) Because public institutions often use outdated software and equipment, which means that their computer systems are packed with security holes just begging to be exploited Because ransomware has a big impact on conducting usual activities, causing huge disruptions heimdalsecurity.com Why do ransomware creators and distributors target public institutions?
  • 4. Victims are hacked by clicking on an innocuous looking attachment or website link within an email. This releases malicious software that disables the victim’s computer system and computers on the same network. Ransom notes then appear across the network demanding money paid in Bitcoin in return for a decryption key that will disable the virus. There is no guarantee that the key will work or prevent further attacks.
  • 5. St Louis Public Library Computers Inoperable ST. LOUIS, MO (KTVI) – All computers at St. Louis Public Library locations are inoperable. The library says that they have been hacked and over 700 computers at 16 branches computers are being held for ransom. "It's been a very sophisticated attack on our system," library executive director Waller McGuire said. "The library is not going to pay a ransom to open up its computers, so we didn't go that far." According to the library, hackers demanded $35,000 in the electronic currency Bitcoin -- but the library refuses to pay. Instead, it'll wipe the entire computer system and reset it, which could take days or weeks. The entire checkout system is on hold. No one can walk out with any of the library's 4 million books, magazines and videos. And all computers are frozen.
  • 6.
  • 7. “Trust No One. Literally” 1. Keep system and antivirus patched and updated. Utilize pop-up blockers. 2. Scrutinize links contained in e-mails and do not open attachments included in unsolicited e-mails. Software should only be downloaded from trusted sites. 3. Back up data, make sure it is not accessible by computers. Some ransomware has the capability to lock cloud-based backups when systems continuously back up in real-time. 4. If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections, and shut it down. 5. Scareware impersonates AV and can be ignored, Screenlockers lock a machine up with a full screen message, but encrypting Ransomware “is the truly nasty stuff”.