SlideShare a Scribd company logo
0101010000000010101000101010101000010101010111111010101010111101010100
0101010000000010101000101010101000010101010111111010101010111101010100
0101010000000010101000101010101000010101010111111010101010111101010100
0101010000000010101000101010101000010101010111111010101010111101010100
0101010000000010101000101010101000010101010111111010101010111101010100
0101010000000010101000101010101000010101010111111010101010111101010100
0010101000000001010100010101010100001010101011111101010101011110101010
RANSOMWARE
INFECT YOUR COMPUTER?
0101010000000010101000101010101000010101010111111010101010111101010100
0101010000000010101000101010101000010101010111111010101010111101010100
& WHAT YOU CAN DO TO STAY SAFE.
0010101000000001010100010101010100001010101011111101010101011110101010
HOW DOES A
S a malicious software that locks your
computer or encrypts your data and
demands a ransom in exchange and thus
the name β€˜ransomware’
= ransom + malware
is the 5th most
Verizon Data Breach
Investigation Report 2017
common form of
malware in 2017.
Money demanded in some of
the recent ransomware attacks
of 2017 ranged from 79$ to
4000$ (mostly in Bitcoins)
#1.EMAIL
THE 2 MOST COMMON CHANNELS
ransomware use to infiltrate your computer
Emails serve as the most resourceful tool to deliver ransomware.
β€œ93% of all phishing
emails contained
encryption
ransomware in
2016.”
PhishMe Q1 2016
Malware Review
How is a phishing email used to infect
your computer with a ransomware?
A phishing email containing links to malicious websites -
visiting such sites can drop a ransomware on your PC.
A phishing email carrying attachments hiding ransomware -
Downloading such attachments will execute a ransomware on your PC.
These attachments are usually MS Office docs such as Word, Excel, and PPTs, and
PDFs.
To make a phishing email look more genuine and convincing, it is disguised as something
that you’d expect – invoices, tax forms, letters from a co-employee or your boss, purchase
receipts, etc.
#2.
COMPROMISED WEBSITES
An infected or a compromised website (in this case) is a webpage(s) where the attacker
has hidden an exploit kit (a software designed to misuse software vulnerabilities).
When you visit such a site, this exploit kit will scan your
web browser or other software for security vulnerabilities
it is designed to exploit (security vulnerability is a weakness
in your computer that an attacker can misuse). And if a
vulnerability is found, the kit will drop the ransomware.
How do you land up on a site compromised with an exploit kit?
By clicking on a link in a phishing email – the most common way
By clicking on a malicious advertisement
This attack is called malvertisement – ads loaded with malware.
Malicious ads do not only appear on shady websites, they target genuine
websites too. This means, clicking on an ad on a legitimate website can also
infect your computer with a ransomware.
Case in point: Malicious ads (containing the Angler exploit kit) appeared on
The New York Times, the BBC, AOL, and the MSN homepage in 2016, delivering ransomware
to the people visiting these websites.
FREE! FREE!
HOW DO YOU DEFEAT
RANSOMWARE? X XBANG!
Staying safe from ransomware means preventing it from
getting inside your computer. You can do this by…
#1. NOT CLICKING on links or downloading attachments from unknown or unexpected sources
(even if the sender looks familiar).
#2. PATCHING all vulnerabilities in your Operating System and software by applying all recommended
security updates.
#3. PROTECTING your computer with an antivirus that can block access to compromised websites and
prevent ransomware from getting downloaded on the system.
BACKUP YOUR DATA regularly. Consider storing them securely in multiple, offline locations.
Should a ransomware infection occur, you can restore your data from these backups.
#4.
#5. INSTALL AD-BLOCKERS on your web browsers. This will reduce your risk on clicking on
malicious or harmful advertisements.
STAY AWARE
STAY SAFE
Sources
blogs.quickheal.com | phishme.com |
www.us-cert.gov | www.wired.com |
www.securityaffairs.co
www.seqrite.com
@Seqrite
/seqrite

More Related Content

PDF
Cybercrime - Why we're not doomed after all
PDF
How to prevent a Phishing attack - Panda Security
PPT
Topic 12 internet security
Β 
DOC
Gsm based vehicle theft control system
Β 
PPTX
Fraud: Beware of Bruce Green, CEO of the Secure Platform Funding
PPTX
Beware of Bruce Green, CEO of the Secure Platform Funding
PDF
Fraud Analytics Techniques Moving Into Security
PDF
How ransomware can hold your business hostage
Cybercrime - Why we're not doomed after all
How to prevent a Phishing attack - Panda Security
Topic 12 internet security
Β 
Gsm based vehicle theft control system
Β 
Fraud: Beware of Bruce Green, CEO of the Secure Platform Funding
Beware of Bruce Green, CEO of the Secure Platform Funding
Fraud Analytics Techniques Moving Into Security
How ransomware can hold your business hostage

Similar to [Infographic] How ransomware gets into your system (20)

PDF
3. Ransomware (cyber awareness series)
PDF
Know More About Malvertising!
PPTX
Icspa virus removal
PPTX
Malvertisement the covert advert
PPTX
How to remove fanli90.cn
PPT
How to uninstall mpc cleaner rogue program
PDF
Ransomware Specialists How the Attack Happens
PDF
Ransomware Specialists How the Attack Happens
PPTX
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
PPT
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
PPT
How safe is your computer?
PDF
lastline-breach-detection-platform-datasheet
PDF
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
PPTX
Windows defender email scam
PDF
cybercrime survival guide
PDF
Eliminate omerstroke
ODP
Eliminate omerstroke
ODP
Eliminate omerstroke
PDF
The Best And Easiest Ways To Protect Yourself From Hackers
PPTX
Mischievous Malware
3. Ransomware (cyber awareness series)
Know More About Malvertising!
Icspa virus removal
Malvertisement the covert advert
How to remove fanli90.cn
How to uninstall mpc cleaner rogue program
Ransomware Specialists How the Attack Happens
Ransomware Specialists How the Attack Happens
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
How safe is your computer?
lastline-breach-detection-platform-datasheet
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Windows defender email scam
cybercrime survival guide
Eliminate omerstroke
Eliminate omerstroke
Eliminate omerstroke
The Best And Easiest Ways To Protect Yourself From Hackers
Mischievous Malware
Ad

More from Seqrite (12)

PDF
Cybersecurity Myths for Small and Medium-Sized Businesses
PDF
UTM & Next-Gen Firewall Solution: What's the difference?
PPTX
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
PDF
[Infographic] Data Loss Prevention
PPTX
5 Cybersecurity threats in Public Sector
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PDF
[Infographic] 7 Cyber attacks that shook the world
PDF
[Infographic] 5 Security Threats in Healthcare Industry
PPTX
Importance of cyber security in education sector
PPTX
Data security for healthcare industry
PDF
Top 5 Cybersecurity Risks in Banking
PPTX
7 Cyber attacks that shook the world
Cybersecurity Myths for Small and Medium-Sized Businesses
UTM & Next-Gen Firewall Solution: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
[Infographic] Data Loss Prevention
5 Cybersecurity threats in Public Sector
Top 5 Cybersecurity Threats in Retail Industry
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 5 Security Threats in Healthcare Industry
Importance of cyber security in education sector
Data security for healthcare industry
Top 5 Cybersecurity Risks in Banking
7 Cyber attacks that shook the world
Ad

Recently uploaded (20)

PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPT
tcp ip networks nd ip layering assotred slides
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
PPTX
Digital Literacy And Online Safety on internet
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PPTX
Introduction to Information and Communication Technology
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Testing WebRTC applications at scale.pdf
PDF
Introduction to the IoT system, how the IoT system works
PPTX
artificial intelligence overview of it and more
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Design_with_Watersergyerge45hrbgre4top (1).ppt
Introuction about WHO-FIC in ICD-10.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
tcp ip networks nd ip layering assotred slides
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
Digital Literacy And Online Safety on internet
SAP Ariba Sourcing PPT for learning material
WebRTC in SignalWire - troubleshooting media negotiation
Unit-1 introduction to cyber security discuss about how to secure a system
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
The Internet -By the Numbers, Sri Lanka Edition
Β 
Introduction to Information and Communication Technology
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
Module 1 - Cyber Law and Ethics 101.pptx
Testing WebRTC applications at scale.pdf
Introduction to the IoT system, how the IoT system works
artificial intelligence overview of it and more
Cloud-Scale Log Monitoring _ Datadog.pdf

[Infographic] How ransomware gets into your system

  • 1. 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0010101000000001010100010101010100001010101011111101010101011110101010 RANSOMWARE INFECT YOUR COMPUTER? 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 & WHAT YOU CAN DO TO STAY SAFE. 0010101000000001010100010101010100001010101011111101010101011110101010 HOW DOES A S a malicious software that locks your computer or encrypts your data and demands a ransom in exchange and thus the name β€˜ransomware’ = ransom + malware is the 5th most Verizon Data Breach Investigation Report 2017 common form of malware in 2017. Money demanded in some of the recent ransomware attacks of 2017 ranged from 79$ to 4000$ (mostly in Bitcoins) #1.EMAIL THE 2 MOST COMMON CHANNELS ransomware use to infiltrate your computer Emails serve as the most resourceful tool to deliver ransomware. β€œ93% of all phishing emails contained encryption ransomware in 2016.” PhishMe Q1 2016 Malware Review How is a phishing email used to infect your computer with a ransomware? A phishing email containing links to malicious websites - visiting such sites can drop a ransomware on your PC. A phishing email carrying attachments hiding ransomware - Downloading such attachments will execute a ransomware on your PC. These attachments are usually MS Office docs such as Word, Excel, and PPTs, and PDFs. To make a phishing email look more genuine and convincing, it is disguised as something that you’d expect – invoices, tax forms, letters from a co-employee or your boss, purchase receipts, etc. #2. COMPROMISED WEBSITES An infected or a compromised website (in this case) is a webpage(s) where the attacker has hidden an exploit kit (a software designed to misuse software vulnerabilities). When you visit such a site, this exploit kit will scan your web browser or other software for security vulnerabilities it is designed to exploit (security vulnerability is a weakness in your computer that an attacker can misuse). And if a vulnerability is found, the kit will drop the ransomware. How do you land up on a site compromised with an exploit kit? By clicking on a link in a phishing email – the most common way By clicking on a malicious advertisement This attack is called malvertisement – ads loaded with malware. Malicious ads do not only appear on shady websites, they target genuine websites too. This means, clicking on an ad on a legitimate website can also infect your computer with a ransomware. Case in point: Malicious ads (containing the Angler exploit kit) appeared on The New York Times, the BBC, AOL, and the MSN homepage in 2016, delivering ransomware to the people visiting these websites. FREE! FREE! HOW DO YOU DEFEAT RANSOMWARE? X XBANG! Staying safe from ransomware means preventing it from getting inside your computer. You can do this by… #1. NOT CLICKING on links or downloading attachments from unknown or unexpected sources (even if the sender looks familiar). #2. PATCHING all vulnerabilities in your Operating System and software by applying all recommended security updates. #3. PROTECTING your computer with an antivirus that can block access to compromised websites and prevent ransomware from getting downloaded on the system. BACKUP YOUR DATA regularly. Consider storing them securely in multiple, offline locations. Should a ransomware infection occur, you can restore your data from these backups. #4. #5. INSTALL AD-BLOCKERS on your web browsers. This will reduce your risk on clicking on malicious or harmful advertisements. STAY AWARE STAY SAFE Sources blogs.quickheal.com | phishme.com | www.us-cert.gov | www.wired.com | www.securityaffairs.co www.seqrite.com @Seqrite /seqrite