Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
This is 1qaz2ws
my data 3edc4rfv
5tgb6yhn
7ujm8ikm
Key Encryption
plain text cipher text
Algorithm
This is 1qaz2ws
my data 3edc4rfv Internet
5tgb6yhn
7ujm8ikm
Decryption
plain text Algorithm cipher text
+
Key
ENCRYPTION: PRACTICAL USE
OpenVPN HTTP
USA Singapore
USA
ENCRYPTION: PRACTICAL USE
• What is Ransomware?!
• Malware that can hold your computer and/or its data hostage
• Your computer and/or data is “freed” in exchange for money
• Premium SMS
• Bitcoin
• Western Union
• Two general types:
• Lock screen
• Encrypting ransomware
RANSOMWARE
Example: Teslacrypt
HOW DID THIS HAPPEN?!
Source: Proofpoint
RANSOMWARE: THE FALLOUT
Source: Symantec
RANSOMWARE: STATISTICS
Average Ransom Amount (by year)
Source: Symantec
Almost 2/3 of Submitted Exploits have Ransomware Payloads
• Effective
WHY?
• Lucrative
Source: Malwarebytes
RANSOMWARE: TRENDS
600%
Source: Proofpoint
Android Ransomware from 4/2014 to 3/2016
136,532
Phones
Source: Kaspersky
NOW WHAT?!!
• Don’t Pay!
• Doesn’t guarantee you will get your computer and/or data back
• Funds sent will be used to target you and others further
• Isolate infected computer from rest of the network
• Restore files from known good backup
• Do you even have one???
• Submit malware to antivirus solution so signatures can be created
RANSOMWARE: HOW TO AVOID IT?
• Encryption when utilized to secure sensitive data and computer systems can be
extremely effective
• Cyber criminals have matured in parallel with IT experts and consistently discover
innovative methods to gain unauthorized access to your data
• Using encryption, criminals can hold your computers and data hostage until monetary
demands are met
• Ransomware is becoming the #1 issue among IT security professionals worldwide
QUESTIONS
THANK YOU!
Scott Pearson
US Department of State
Anti-Terrorism Assistance Program
spearson47@gmail.com