SlideShare a Scribd company logo
1 of 28
WELCOME TO
SPONSORED BY
Trends We Saw in 2017
Email Breaches
HIPAA Fines
Ransomware
HIPAA Breach Report - Nov
HIPAA Breach Report - Oct
HIPAA Breach Report - Sept
January – June
2017 HIPAA fine
$115 Million
2016 HIPAA fines
$23 Million
ANATOMY OF A
RANSOMWARE ATTACK
Hoala Greevy
Founder CEO, Paubox
At a Glance
•48% of U.S. organizations
•$300 - $500 bitcoin
•HHS and Ransomware
Why is it so effective?
Macros are bad for email
Anti-Virus Signatures Don’t
Work
Gone in 58 Seconds
“99% of malware hashes are
seen for only 58 seconds or
less.”
Source: Twitter (@jeremiahg)
The 3 Stages of Ransomware
1) Delivery
2) Infection
3) Recovery
How do we stop it?
ML for Advanced Security
Domain Age
Phishing Competitions
Forecasting 2018
Email remains Top Dog
Portals continue to suck
“Don’t make me login to one more portal.
Please.”
Ample Market Opportunity
Mahalo!

More Related Content

What's hot

Week 8.2 Anonymous Networks
Week 8.2 Anonymous NetworksWeek 8.2 Anonymous Networks
Week 8.2 Anonymous NetworksIIIT Hyderabad
 
Data sync slideshare example
Data sync slideshare exampleData sync slideshare example
Data sync slideshare exampleKatie Gray
 
If Content is King, Who is Sheriff? 2014 SXSW panel
If Content is King, Who is Sheriff? 2014 SXSW panel If Content is King, Who is Sheriff? 2014 SXSW panel
If Content is King, Who is Sheriff? 2014 SXSW panel gmarie53
 
GreatHorn - Techstars NYC 2015 Demo Day
GreatHorn - Techstars NYC 2015 Demo DayGreatHorn - Techstars NYC 2015 Demo Day
GreatHorn - Techstars NYC 2015 Demo DayKevin O'Brien
 
Cyber security training presentation
Cyber security training presentationCyber security training presentation
Cyber security training presentationBrandon Vancleeve
 
Rape prevention with AI for Face2Face Presentation
Rape prevention with AI for Face2Face PresentationRape prevention with AI for Face2Face Presentation
Rape prevention with AI for Face2Face PresentationHemant Sarthak
 
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserAnalytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserBrand Sauce
 

What's hot (10)

Week 8.2 Anonymous Networks
Week 8.2 Anonymous NetworksWeek 8.2 Anonymous Networks
Week 8.2 Anonymous Networks
 
Data sync slideshare example
Data sync slideshare exampleData sync slideshare example
Data sync slideshare example
 
If Content is King, Who is Sheriff? 2014 SXSW panel
If Content is King, Who is Sheriff? 2014 SXSW panel If Content is King, Who is Sheriff? 2014 SXSW panel
If Content is King, Who is Sheriff? 2014 SXSW panel
 
Tactical SEO
Tactical SEOTactical SEO
Tactical SEO
 
GreatHorn - Techstars NYC 2015 Demo Day
GreatHorn - Techstars NYC 2015 Demo DayGreatHorn - Techstars NYC 2015 Demo Day
GreatHorn - Techstars NYC 2015 Demo Day
 
HRCC-Postcard v7
HRCC-Postcard v7HRCC-Postcard v7
HRCC-Postcard v7
 
Cyber security training presentation
Cyber security training presentationCyber security training presentation
Cyber security training presentation
 
An Idiot’s Guide to Winning at SEO and Influencing SERPS with Mike Ramsey
An Idiot’s Guide to Winning at SEO and Influencing SERPS with Mike RamseyAn Idiot’s Guide to Winning at SEO and Influencing SERPS with Mike Ramsey
An Idiot’s Guide to Winning at SEO and Influencing SERPS with Mike Ramsey
 
Rape prevention with AI for Face2Face Presentation
Rape prevention with AI for Face2Face PresentationRape prevention with AI for Face2Face Presentation
Rape prevention with AI for Face2Face Presentation
 
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserAnalytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
 

Similar to Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017

Paubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox, Inc.
 
Email Trends in Healthcare 2016
Email Trends in Healthcare 2016Email Trends in Healthcare 2016
Email Trends in Healthcare 2016Paubox, Inc.
 
State of Internet 1H 2008
State of Internet 1H 2008State of Internet 1H 2008
State of Internet 1H 2008Kim Jensen
 
Online Trust and Safety, A New Dimension for Real-Time Engagement
Online Trust and Safety, A New Dimension for Real-Time EngagementOnline Trust and Safety, A New Dimension for Real-Time Engagement
Online Trust and Safety, A New Dimension for Real-Time EngagementTiffany Xingyu Wang
 
Thriving in an Era of Digital Disruption - ASAPS 2018
Thriving in an Era of Digital Disruption - ASAPS 2018Thriving in an Era of Digital Disruption - ASAPS 2018
Thriving in an Era of Digital Disruption - ASAPS 2018RealSelf
 
Tha security awareness training
Tha security awareness trainingTha security awareness training
Tha security awareness trainingRob Valdez
 
Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 bcilondonforum
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackrohit2495
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017malvvv
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesPaubox, Inc.
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]guest043f27
 
AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...
AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...
AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...Amazon Web Services
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
LashBack Presentation at Mailcon January 2018
LashBack Presentation at Mailcon January 2018LashBack Presentation at Mailcon January 2018
LashBack Presentation at Mailcon January 2018LashBack, LLC
 

Similar to Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017 (16)

Paubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox Social Mixer in Boston
Paubox Social Mixer in Boston
 
Email Trends in Healthcare 2016
Email Trends in Healthcare 2016Email Trends in Healthcare 2016
Email Trends in Healthcare 2016
 
State of Internet 1H 2008
State of Internet 1H 2008State of Internet 1H 2008
State of Internet 1H 2008
 
Online Trust and Safety, A New Dimension for Real-Time Engagement
Online Trust and Safety, A New Dimension for Real-Time EngagementOnline Trust and Safety, A New Dimension for Real-Time Engagement
Online Trust and Safety, A New Dimension for Real-Time Engagement
 
Thriving in an Era of Digital Disruption - ASAPS 2018
Thriving in an Era of Digital Disruption - ASAPS 2018Thriving in an Era of Digital Disruption - ASAPS 2018
Thriving in an Era of Digital Disruption - ASAPS 2018
 
Tha security awareness training
Tha security awareness trainingTha security awareness training
Tha security awareness training
 
Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 Mimecast BCI Event October 2017
Mimecast BCI Event October 2017
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
 
AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...
AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...
AWS re:Invent 2016: No More Ransomware: How Europol, the Dutch Police, and AW...
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
LashBack Presentation at Mailcon January 2018
LashBack Presentation at Mailcon January 2018LashBack Presentation at Mailcon January 2018
LashBack Presentation at Mailcon January 2018
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017