SlideShare a Scribd company logo
MALWARE AND
RANSOMWARE
ATTACKS
AARUSHI CHOPRA
ASSOCIATE AT SETH ASSOCIATES
STATISTICS
โ€ขA ransomware attack occurs every 2 secs.
โ€ขEvery day 1.7 million, and every second
19 ransomware attacks occur.
โ€ขThe average cost of a ransomware attack
was $1.85 million in 2022.
โ€ขThe first half of 2022 saw nearly 236.7
million ransomware attacks worldwide.
โ€ขThere is 51% increase in ransomware
incidents reported in 2022 compared to
2021.
MALWARE
ATTACKS
โ€ข Malware is one of the most common cyber threats.
โ€ข It is an umbrella term for any type of malicious software designed to
steal data and or destroy data on a computer or network. .
โ€ข It is used to represent a variety of cyber threats like spyware,
ransomware, viruses, bots, trojans, and worms.
โ€ข It is commonly introduced via email attachments, downloads or network
vulnerabilities.
What is a malware?
Main aspects of
a malware
attack
โ€ขObjective: What the malware is designed
to achieve.
โ€ขDelivery: How the malware is delivered to
the target.
โ€ขConcealment: How the malware avoids
detection.
โ€ข Stealing data, credentials, payment information, etc.
โ€ข Destroys computer systems. Here the level of destruction can vary
depending on the intention of the attacker.
โ€ข Locking up networks and PCs, making them unusable to further extort
money from the target either by scareware or ransomware.
โ€ข Uses your computing power to send spam emails.
Common Objectives
TYPES OF
MALWARE
ATTACKS
Virus
Worm
Trojan
Hybrid malware
Adware
Malvertising
Spyware
Ransomware
Fileless malware
Scareware
Rootkit
Bot
Keyloggers
Backdoors
RAT
Downloaders
POS
โ€ข Adware: It shows ads and popups that link to unsafe sites. It
redirects users to similar lookalike sites promoting advertised
products that can be potentially malicious.
https://www.techtarget.com/searchsecurity/definition/adware
โ€ข Spyware: It monitors usersโ€™ online activities and browsing habits
without their consent, to collect financial details and login
credentials.
https://www.techtarget.com/searchsecurity/answer/The-effects-of-spyware
โ€ข Viruses: They can delete important files or corrupt data by shutting
down the device in the middle of use.
https://cyware.com/news/luzerne-county-in-pennsylvania-hit-with-virus-attack-09a9058b
โ€ข Trojans: They are hidden in online games or software and take
control of the device. It is used to install further malware, delete or
steal important data, monitor online activities, or modify files.
https://in.pinterest.com/pin/671740100657212227/
Worms: They are a
self-replicating type of malware
that can spread to other
computers. Worms can spread
through โ€“
โ€ขcomputer networks,
โ€ขe-mails,
โ€ขinstant-messaging services,
โ€ขsocial networks,
โ€ขremovable media and
โ€ขother channels.
https://twitter.com/gosafeonline/status/997673392823140352
โ€ข Scareware: Cybercriminals scare us into thinking that our
computers or smartphones have become infected to convince
victims to purchase a fake application.
https://www.wallarm.com/what/what-is-scareware-malware-removal-and-protection
โ€ข In April 2022, Oil India was hit by a malware attack in its field headquarters
in eastern Assam's Duliajan, wherein the hacker demanding $75,00,000.
โ€ข After receipt of the report of malware threat, precautionary measures were
taken by the company.
โ€ข Network management service providers and the Anti-Virus Team were
immediately informed & the incident was also reported to the Indian
Computer Emergency Response Team (CERT-In).
โ€ข The company did not attempt to establish any contacts with the miscreants.
Recent Cases
RANSOMWARE
ATTACKS
โ€ข Cybercriminals utilize ransomware as a sort of malware.
โ€ข When ransomware infects a computer or network, it either (i) locks the
system's screen or (ii) locks the users' files.
โ€ข In exchange for releasing the data, cybercriminals seek ransom money
from their victims.
โ€ข The Remote Desktop Protocol, phishing emails, and software flaws are
commonly used as attack vectors.
What is a ransomware attack?
LOCKER RANSOMWARE
This malware prevents basic computer
processes from functioning. For
example, you may be denied access to
the desktop, while the mouse and
keyboard are partially disabled. This
permits you to continue interacting
with the ransom demand window in
order to make the payment. Aside from
that, the PC is unusable.
CRYPTO RANSOMWARE
Here the goal is to encrypt your vital
data, such as documents, photos, and
videos, while not interfering with basic
computer functionality. Crypto
developers frequently include a
countdown to their ransom demand. The
encrypted files ensures that victims are
forced to pay the ransom even if the
malware itself was deleted.
TYPES OF RANSOMEWARE ATTACKS
https://www.knowbe4.com/locker-ransomware
https://www.knowbe4.com/cryptolocker-2
โ€ข Recently, the All India Institute of Medical Sciences (AIIMS), the
country's foremost healthcare institution, reported a large cyber hacking
as the result of a ransomware attack.
โ€ข The cyber-attack caused a server outage, which disrupted daily hospital
operations like appointments, patient registration, discharge, and more.
Recent Cases
How to Mitigate
an Active
Ransomware
Infection
1. Quarantine the Machine: You must isolate systems so that they
cannot affect the rest of the environment.
2. Leave the Computer On: Encryption of files may make a computer
unstable and powering off a computer can result in loss of memory.
Keep the computer on to maximize the probability of recovery.
3. Create a Backup: Decryption of files is sometimes possible without
paying the ransom. Make a copy of encrypted files on a removable
media in case a solution becomes available in the future.
4. Check for Decryptors: Check if a free decryptor is available. If so, run it
on a copy of the encrypted data to see if it can restore the files.
5. Ask For Help: A digital forensics expert may be able to recover the
backup copies stored on a computer if they havnโ€™t been deleted by the
malware.
6. Wipe and Restore: Restore the machine from a clean backup. This
ensures that the malware is completely removed from the device.
CYBER SAFETY
FOR PARENTS &
CHILDREN
โ€ข Donโ€™t download any unknown
software/App.
โ€ข Donโ€™t open unknown attachments or
links in suspicious emails.
โ€ข Donโ€™t provide personal information to
anyone through the internet.
โ€ข Learn how to identify potential
malware (i.e. phishing emails, unknown
applications running on a system).
โ€ข If a child uses email, talk to them to
ensure they know their peers and
teachersโ€™ email addresses.
โ€ข Keep their social media accounts set to
private and explore other settings that
can keep them safe.
DOโ€™s DONTโ€™s
โ€ข Periodic, unannounced exercises, such as intentional phishing campaigns.
โ€ข Equip the computers with a good anti-virus software.
โ€ข Use multi-factor authentication to protect your accounts.
โ€ข Always keep the systems updated.
โ€ข Employ strong & complex passwords.
โ€ข Change your passwords regularly and never save passwords electronically.
โ€ข Back up important files using the 3-2-1 rule: Create three backup copies
on two different media with one backup in a separate location.
BEST PRACTICES
How to
identify
phishing
emails
Check Grammatical and Spelling
Errors
https://www.capnet.co.uk/news/spot-a-phishing-scam-email
https://awarego.com/recognize-phishing-emails-avoid-being-scammed/
Reporting malware
and ransomware
attacks
โ€ข This notification is for all service provider, intermediary, data centre, body corporate and
Government organisation.
โ€ข They must mandatorily report cyber incidents to CERT-In within 6 hours of noticing
such incidents.
โ€ข The incidents can be reported to CERT-In via email (incident@cert-in.org.in), Phone
(1800-11-4949) and Fax (1800-11-6969).
Notification No. 20(3)/2022-CERT-In,
Dated: 28 April, 2022
CERT-In 6 Hours Reporting Timeline
โ€ข https://cybercrime.gov.in/ is the main cybercrime reporting portal
in India. The offence is punishable under Section 66 of IT Act, 2000
with three years of imprisonment , fine or both.
โ€ข When you are hit by a malware or a ransomware attack, you can
report the same on the portal under different heads such as โ€œData
theftโ€, โ€œRansomwareโ€, โ€œVirus, Worms & Trojansโ€, or โ€œDenial of
Services/Distributed DOSโ€.
Cybercrime Reporting Portal
โ€ข The singular objective of this platform is to prevent the defrauded
money from exiting the financial ecosystem and ending up in the
hands of the fraudsters.
โ€ข You must report the financial fraud within 24 hours of occurrence.
โ€ข This platform has been made operational by the Indian Cyber
Coordination Centre (14C).
โ€ข It has the active support and cooperation of Reserve Bank of
India(RBI), all major banks, payment gateways and online
merchants.
1930 Financial Fraud Helpline No.
Thank You

More Related Content

PPTX
Ransomeware and malware power point presentation
PPTX
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
PPTX
Cybersecurity awareness session.pptx
PPTX
PPSX
Security Awareness Training
PPTX
Ransomware by lokesh
PPTX
Ransomware attacks reveton
PDF
fundamentals of Cybersecurity Lesion 1.pdf
Ransomeware and malware power point presentation
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
Cybersecurity awareness session.pptx
Security Awareness Training
Ransomware by lokesh
Ransomware attacks reveton
fundamentals of Cybersecurity Lesion 1.pdf

Similar to NCERT Ransomeware and malware attacks.pdf (20)

PPT
Cyber Security-Foundation.ppt
PPTX
Computer-Security.pptx
PPTX
cybersecurity.pptx
PPTX
Ransomware and email security ver - 1.3
PDF
Combating RANSOMWare
PPT
Cyber-Security-.ppt
PPTX
Guest Lecture-Computer and Cyber Security.pptx
PDF
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...
PPTX
Cyber Security Presentation - IT Will Never Happen To Me
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PDF
Ransomware ly
PPTX
Cybersecurity Training
PPSX
csa2014 IBC
ย 
PPT
Cyber-Security.ppt
PDF
How to Help Your Customers Protect Themselves from Ransomware Attacks
PPTX
RANSOMWARE.pptx
PPTX
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
PPTX
Computer security ethics_and_privacy
PPTX
Ransomware
PDF
Week3-CyberSecurity 8th Semester important.pdf
Cyber Security-Foundation.ppt
Computer-Security.pptx
cybersecurity.pptx
Ransomware and email security ver - 1.3
Combating RANSOMWare
Cyber-Security-.ppt
Guest Lecture-Computer and Cyber Security.pptx
Your Money or Your Data: Ransomware, Cyber Security and Todayโ€™s Threat Landsc...
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation "It Will Never Happen To Me"
Ransomware ly
Cybersecurity Training
csa2014 IBC
ย 
Cyber-Security.ppt
How to Help Your Customers Protect Themselves from Ransomware Attacks
RANSOMWARE.pptx
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
Computer security ethics_and_privacy
Ransomware
Week3-CyberSecurity 8th Semester important.pdf
Ad

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Internet___Basics___Styled_ presentation
PDF
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Funds Management Learning Material for Beg
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Digital Literacy And Online Safety on internet
Slides PPTX World Game (s) Eco Economic Epochs.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
Module 1 - Cyber Law and Ethics 101.pptx
SAP Ariba Sourcing PPT for learning material
Slides PDF The World Game (s) Eco Economic Epochs.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
presentation_pfe-universite-molay-seltan.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
PptxGenJS_Demo_Chart_20250317130215833.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
Paper PDF World Game (s) Great Redesign.pdf
Internet___Basics___Styled_ presentation
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
QR Codes Qr codecodecodecodecocodedecodecode
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Unit-1 introduction to cyber security discuss about how to secure a system
Funds Management Learning Material for Beg
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Ad

NCERT Ransomeware and malware attacks.pdf

  • 2. STATISTICS โ€ขA ransomware attack occurs every 2 secs. โ€ขEvery day 1.7 million, and every second 19 ransomware attacks occur. โ€ขThe average cost of a ransomware attack was $1.85 million in 2022. โ€ขThe first half of 2022 saw nearly 236.7 million ransomware attacks worldwide. โ€ขThere is 51% increase in ransomware incidents reported in 2022 compared to 2021.
  • 4. โ€ข Malware is one of the most common cyber threats. โ€ข It is an umbrella term for any type of malicious software designed to steal data and or destroy data on a computer or network. . โ€ข It is used to represent a variety of cyber threats like spyware, ransomware, viruses, bots, trojans, and worms. โ€ข It is commonly introduced via email attachments, downloads or network vulnerabilities. What is a malware?
  • 5. Main aspects of a malware attack โ€ขObjective: What the malware is designed to achieve. โ€ขDelivery: How the malware is delivered to the target. โ€ขConcealment: How the malware avoids detection.
  • 6. โ€ข Stealing data, credentials, payment information, etc. โ€ข Destroys computer systems. Here the level of destruction can vary depending on the intention of the attacker. โ€ข Locking up networks and PCs, making them unusable to further extort money from the target either by scareware or ransomware. โ€ข Uses your computing power to send spam emails. Common Objectives
  • 7. TYPES OF MALWARE ATTACKS Virus Worm Trojan Hybrid malware Adware Malvertising Spyware Ransomware Fileless malware Scareware Rootkit Bot Keyloggers Backdoors RAT Downloaders POS
  • 8. โ€ข Adware: It shows ads and popups that link to unsafe sites. It redirects users to similar lookalike sites promoting advertised products that can be potentially malicious. https://www.techtarget.com/searchsecurity/definition/adware
  • 9. โ€ข Spyware: It monitors usersโ€™ online activities and browsing habits without their consent, to collect financial details and login credentials. https://www.techtarget.com/searchsecurity/answer/The-effects-of-spyware
  • 10. โ€ข Viruses: They can delete important files or corrupt data by shutting down the device in the middle of use. https://cyware.com/news/luzerne-county-in-pennsylvania-hit-with-virus-attack-09a9058b
  • 11. โ€ข Trojans: They are hidden in online games or software and take control of the device. It is used to install further malware, delete or steal important data, monitor online activities, or modify files. https://in.pinterest.com/pin/671740100657212227/
  • 12. Worms: They are a self-replicating type of malware that can spread to other computers. Worms can spread through โ€“ โ€ขcomputer networks, โ€ขe-mails, โ€ขinstant-messaging services, โ€ขsocial networks, โ€ขremovable media and โ€ขother channels. https://twitter.com/gosafeonline/status/997673392823140352
  • 13. โ€ข Scareware: Cybercriminals scare us into thinking that our computers or smartphones have become infected to convince victims to purchase a fake application. https://www.wallarm.com/what/what-is-scareware-malware-removal-and-protection
  • 14. โ€ข In April 2022, Oil India was hit by a malware attack in its field headquarters in eastern Assam's Duliajan, wherein the hacker demanding $75,00,000. โ€ข After receipt of the report of malware threat, precautionary measures were taken by the company. โ€ข Network management service providers and the Anti-Virus Team were immediately informed & the incident was also reported to the Indian Computer Emergency Response Team (CERT-In). โ€ข The company did not attempt to establish any contacts with the miscreants. Recent Cases
  • 16. โ€ข Cybercriminals utilize ransomware as a sort of malware. โ€ข When ransomware infects a computer or network, it either (i) locks the system's screen or (ii) locks the users' files. โ€ข In exchange for releasing the data, cybercriminals seek ransom money from their victims. โ€ข The Remote Desktop Protocol, phishing emails, and software flaws are commonly used as attack vectors. What is a ransomware attack?
  • 17. LOCKER RANSOMWARE This malware prevents basic computer processes from functioning. For example, you may be denied access to the desktop, while the mouse and keyboard are partially disabled. This permits you to continue interacting with the ransom demand window in order to make the payment. Aside from that, the PC is unusable. CRYPTO RANSOMWARE Here the goal is to encrypt your vital data, such as documents, photos, and videos, while not interfering with basic computer functionality. Crypto developers frequently include a countdown to their ransom demand. The encrypted files ensures that victims are forced to pay the ransom even if the malware itself was deleted. TYPES OF RANSOMEWARE ATTACKS
  • 20. โ€ข Recently, the All India Institute of Medical Sciences (AIIMS), the country's foremost healthcare institution, reported a large cyber hacking as the result of a ransomware attack. โ€ข The cyber-attack caused a server outage, which disrupted daily hospital operations like appointments, patient registration, discharge, and more. Recent Cases
  • 21. How to Mitigate an Active Ransomware Infection
  • 22. 1. Quarantine the Machine: You must isolate systems so that they cannot affect the rest of the environment. 2. Leave the Computer On: Encryption of files may make a computer unstable and powering off a computer can result in loss of memory. Keep the computer on to maximize the probability of recovery. 3. Create a Backup: Decryption of files is sometimes possible without paying the ransom. Make a copy of encrypted files on a removable media in case a solution becomes available in the future.
  • 23. 4. Check for Decryptors: Check if a free decryptor is available. If so, run it on a copy of the encrypted data to see if it can restore the files. 5. Ask For Help: A digital forensics expert may be able to recover the backup copies stored on a computer if they havnโ€™t been deleted by the malware. 6. Wipe and Restore: Restore the machine from a clean backup. This ensures that the malware is completely removed from the device.
  • 25. โ€ข Donโ€™t download any unknown software/App. โ€ข Donโ€™t open unknown attachments or links in suspicious emails. โ€ข Donโ€™t provide personal information to anyone through the internet. โ€ข Learn how to identify potential malware (i.e. phishing emails, unknown applications running on a system). โ€ข If a child uses email, talk to them to ensure they know their peers and teachersโ€™ email addresses. โ€ข Keep their social media accounts set to private and explore other settings that can keep them safe. DOโ€™s DONTโ€™s
  • 26. โ€ข Periodic, unannounced exercises, such as intentional phishing campaigns. โ€ข Equip the computers with a good anti-virus software. โ€ข Use multi-factor authentication to protect your accounts. โ€ข Always keep the systems updated. โ€ข Employ strong & complex passwords. โ€ข Change your passwords regularly and never save passwords electronically. โ€ข Back up important files using the 3-2-1 rule: Create three backup copies on two different media with one backup in a separate location. BEST PRACTICES
  • 28. Check Grammatical and Spelling Errors https://www.capnet.co.uk/news/spot-a-phishing-scam-email
  • 31. โ€ข This notification is for all service provider, intermediary, data centre, body corporate and Government organisation. โ€ข They must mandatorily report cyber incidents to CERT-In within 6 hours of noticing such incidents. โ€ข The incidents can be reported to CERT-In via email (incident@cert-in.org.in), Phone (1800-11-4949) and Fax (1800-11-6969). Notification No. 20(3)/2022-CERT-In, Dated: 28 April, 2022 CERT-In 6 Hours Reporting Timeline
  • 32. โ€ข https://cybercrime.gov.in/ is the main cybercrime reporting portal in India. The offence is punishable under Section 66 of IT Act, 2000 with three years of imprisonment , fine or both. โ€ข When you are hit by a malware or a ransomware attack, you can report the same on the portal under different heads such as โ€œData theftโ€, โ€œRansomwareโ€, โ€œVirus, Worms & Trojansโ€, or โ€œDenial of Services/Distributed DOSโ€. Cybercrime Reporting Portal
  • 33. โ€ข The singular objective of this platform is to prevent the defrauded money from exiting the financial ecosystem and ending up in the hands of the fraudsters. โ€ข You must report the financial fraud within 24 hours of occurrence. โ€ข This platform has been made operational by the Indian Cyber Coordination Centre (14C). โ€ข It has the active support and cooperation of Reserve Bank of India(RBI), all major banks, payment gateways and online merchants. 1930 Financial Fraud Helpline No.