Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ransomware: 2016's Greatest Malware Threat

212 views

Published on

Ransomware has troubled many individuals and companies and it has been called the greatest malware threat of 2016. Learn how it works and how to protect yourself.

Published in: Internet
  • If we are speaking about saving time and money this site ⇒ www.HelpWriting.net ⇐ is going to be the best option!! I personally used lots of times and remain highly satisfied.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • You have to choose carefully. ⇒ www.HelpWriting.net ⇐ offers a professional writing service. I highly recommend them. The papers are delivered on time and customers are their first priority. This is their website: ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Get Paid To Waste Time On YouTube! ♥♥♥ http://t.cn/AieXiXbg
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • This Single Mother Makes Over $700 per Week Helping Businesses with their Facebook and Twitter Accounts! and Now You Can Too! ★★★ https://tinyurl.com/rbrfd6j
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • You can get paid up to $25 per hour to be on Facebook? ◆◆◆ http://t.cn/AieXipTS
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Ransomware: 2016's Greatest Malware Threat

  1. 1. © 2016 JURINNOV, LLC All Rights Reserved. Ransomware DECEMBER 7, 2016 LEARN ABOUT 2016’S GREATEST MALWARE THREAT
  2. 2. © 2016 JURINNOV, LLC All Rights Reserved. Eric Vanderburg Director of Cybersecurity Various certifications including MCSE, CISSP and HISP Licensed private investigator MBA from Kent State University 18 years experience in IT and cybersecurity Author and regular presenter
  3. 3. © 2016 JURINNOV, LLC All Rights Reserved. Topics • Definition • Target • Effects • Ransoms • Examples • Statistics • Threat Vectors
  4. 4. © 2016 JURINNOV, LLC All Rights Reserved. What is Ransomware? Ransomware - Ransomware is a form of malware that infects a computer, encrypts data on the computer and sometimes attached network drives, and then demands a ransom payment to get the decryption keys. Ransomware as a Service (RaaS) – Ransomware authors license ransomware to distributors in a revenue sharing model.
  5. 5. © 2016 JURINNOV, LLC All Rights Reserved. Target Email Enterprise apps / databases Work product Contacts Photos Multimedia Data is the lifeblood of your business
  6. 6. © 2016 JURINNOV, LLC All Rights Reserved. Effects of ransomware
  7. 7. © 2016 JURINNOV, LLC All Rights Reserved. Ransoms Ransoms range from 0.5 – 5 bitcoins Bitcoin valued at 767 USD or 719 EUR as of December, 2016 Ransoms for organizations are far more
  8. 8. © 2016 JURINNOV, LLC All Rights Reserved. Hollywood Presbyterian Network offline for a week Email and patient data unavailable Had to use paper records and send some patients to other hospitals Paid $17,000 to decrypt filesDate: February, 2016 Ransomware: LOCKY
  9. 9. © 2016 JURINNOV, LLC All Rights Reserved. MedStar Health Couldn’t update thousands of patient records. 10 hospitals and more than 250 outpatient centers to shut down their computers and email Paid $18,500 to decrypt files Date: March, 2016 Ransomware: SAMSAM
  10. 10. © 2016 JURINNOV, LLC All Rights Reserved. Kansas Heart Hospital Widespread infection throughout the hospital Paid the ransom but did not get the decryption keys Date: May, 2016 Ransomware: SAMSAM
  11. 11. © 2016 JURINNOV, LLC All Rights Reserved. San Francisco Municipal Transportation No fares collected on Black Friday Had to use paper records Extortionist demanded $73,000 SFMTA refused to pay Date: November, 2016 Ransomware: HDDCryptor
  12. 12. © 2016 JURINNOV, LLC All Rights Reserved. Hundreds of new ransomware variants just this year this year (over 400% increase since 2015) Stats KeRanger PayCrypt JobCryptor HiBuddy HydraCryptVipasana Umbrecrypt LOCKY CryptoJocker Nanolocker LeChiffre Magic Ginx 73v3n Mamba HDDCryptor SAMSAM Powerware Peyta Jigsaw Cerber Radamant Rokku
  13. 13. © 2016 JURINNOV, LLC All Rights Reserved. Hostage Data System Vulnerabilities Social Engineering Malvertizing Email Social media Instant messaging SMS Drive by Shared folders and cloud data Threat vectors
  14. 14. © 2016 JURINNOV, LLC All Rights Reserved. Questions? FOR MORE INFORMATION: WWW.JURINNOV.COM ERIC.VANDERBURG@JURINNOV.COM 216-664-1100

×