Ransomware
By sunil kumar
BCA-2E
index
• What is ransomware?
• How do criminals install ransomware on your system?
• Types of ransomware
• How to prevent from ransomware?
• Identify the ransomware
• Removal – Microsoft procedure
What is ransomware?
• 'Ransomware' is a type of malware that attempts to extort money
from a computer user by infecting and taking control of the victim's
machine, or the files or documents stored on it.
• Typically, the ransomware will either 'lock' the computer to prevent
normal usage, or encrypt the documents and files on it to prevent
access to the saved data.
How do criminals install ransomware?
• Ransomware generates a pop-up window, webpage, or email warning
from what looks like an official authority.
• Ransomware is usually installed when you open
A malicious email attachment
Click a malicious link in
an email message
an instant message
on social networking site
• Ransomware can even be installed when you visit a malicious website.
Types of Ransomware
• Encryption Ransomware
• Lock Screen Ransomware
• Master Boot Record (MBR) Ransomware
Encryption Ransomware
• Encrypts personal files/folders (e.g., the contents of your My Documents
folder - documents, spreadsheets, pictures, videos).
• Files are deleted once they are encrypted and generally there is a text file in
the same folder as the now-inaccessible files with instructions for payment.
• You may see a lock screen but not all variants show one.
• Instead you may only notice a problem when you attempt to open your files.
• This type is also called 'file encryptor' ransomware.
ransomware presentation in detail explaination
Lock Screen Ransomware
• 'Locks' the screen and demands payment.
• Presents a full screen image that blocks all other windows.
• This type is called 'WinLocker' ransomware.
• No personal files are encrypted.
ransomware presentation in detail explaination
Master Boot Record (MBR) Ransomware
• The Master Boot Record (MBR) is a section of the computer's hard
drive that allows the operating system to boot up.
• MBR ransomware changes the computer's MBR so the normal boot
process is interrupted.
• A ransom demand is displayed on screen instead.
How to prevent ransomware ?
• Keep all of the software on your computer up to date.
• Make sure automatic updating is turned on to get all the latest Microsoft
security updates and browser-related components (Java, Adobe, and the
like).
• Keep your firewall turned on.
• Don't open spam email messages or click links on suspicious websites.
(CryptoLocker spreads via .zip files sent as email attachments, for
example.)
Cont..
• Download Microsoft Security Essentials, which is free, or use another
reputable antivirus and anti-malware program.
• If you run Windows 8 or Windows RT, you don’t need Microsoft Security
Essentials.
• Scan your computer with the Microsoft Safety Scanner.
• Keep your browser clean.
• Always have a good backup system in place, just in case your PC does
become infected and you can’t recover your files.
Identify The Ransomeware
Most commonly, ransomware is saved to one of the following locations:
• C:Programdata(random alpha numerics).exe
• C:Users(username)0.(random numbers).exe
• C:UsersUsernameAppData(random alpha numerics).exe
Removal – Microsoft Procedure
The following Microsoft products can detect and remove this threat:
• Windows Defender (built into Windows 8)
• Microsoft Security Essentials
• Microsoft Safety Scanner
• Windows Defender Offline (Some ransomware will not allow you to use the
products listed here, so you might have to start your computer from a
Windows Defender Offline disk.)
Conclusion
When it comes to malware attacks, knowledge is the best possible
weapon to prevent them. Be careful what you click!! Preventive
measures should be taken before ransomwares establish strong hold.
Keeping all the software updated and getting latest security updates
might help to prevent the attacks. Use of antivirus and original
software is highly recommended. Creating software restriction policy is
the best tool to prevent a Cryptolocker infection in the first place in
networks.
References
• http://www.microsoft.com/security/resources/ransomware-whatis.aspx
• http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx
• http://www.sophos.com/en-us/support/knowledgebase/119006.aspx
• http://us.norton.com/ransomware
• http://en.wikipedia.org/wiki/Ransomware
Thank You

More Related Content

PPTX
Ransomware: WanaCry, WanCrypt
ODP
Viruses andthreats@dharmesh
PPT
Computer virus
PPTX
Computer virus
PPTX
Kinds of Viruses
PPTX
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
PPTX
computer virus full explain ppt.pptx
PPTX
rensomware final ppt
Ransomware: WanaCry, WanCrypt
Viruses andthreats@dharmesh
Computer virus
Computer virus
Kinds of Viruses
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
computer virus full explain ppt.pptx
rensomware final ppt

Similar to ransomware presentation in detail explaination (20)

PPTX
Malware ppt final.pptx
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
PPSX
Ascomputervirus
PDF
How To Protect From Malware
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PPTX
Compter virus and its solution
PPTX
Anti virus
PPTX
Anti Virus Software
PPTX
Computer virus & its cure
PPT
Remove Clickhoofind.com
PPTX
Ransomware Attack.pptx
PPTX
Introduction to computer lec (4)
PPTX
IS100 Week 11
PPTX
lecture-11-30052022-103626am.pptx
PPTX
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
PPTX
Virusppt
PPTX
Presentation related to COMPUTER VIRUS.pptx
PPSX
Computer and internet security
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
PPT
Protecting Your organization from WannaCry Ransomware
Malware ppt final.pptx
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Ascomputervirus
How To Protect From Malware
Get Smart about Ransomware: Protect Yourself and Organization
Compter virus and its solution
Anti virus
Anti Virus Software
Computer virus & its cure
Remove Clickhoofind.com
Ransomware Attack.pptx
Introduction to computer lec (4)
IS100 Week 11
lecture-11-30052022-103626am.pptx
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
Virusppt
Presentation related to COMPUTER VIRUS.pptx
Computer and internet security
Ransomware : A cyber crime without solution ? by Prashant Mali
Protecting Your organization from WannaCry Ransomware
Ad

Recently uploaded (20)

PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
International_Financial_Reporting_Standa.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Trump Administration's workforce development strategy
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
International_Financial_Reporting_Standa.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
History, Philosophy and sociology of education (1).pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Hazard Identification & Risk Assessment .pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
FORM 1 BIOLOGY MIND MAPS and their schemes
Unit 4 Computer Architecture Multicore Processor.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
Introduction to pro and eukaryotes and differences.pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Trump Administration's workforce development strategy
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Ad

ransomware presentation in detail explaination

  • 2. index • What is ransomware? • How do criminals install ransomware on your system? • Types of ransomware • How to prevent from ransomware? • Identify the ransomware • Removal – Microsoft procedure
  • 3. What is ransomware? • 'Ransomware' is a type of malware that attempts to extort money from a computer user by infecting and taking control of the victim's machine, or the files or documents stored on it. • Typically, the ransomware will either 'lock' the computer to prevent normal usage, or encrypt the documents and files on it to prevent access to the saved data.
  • 4. How do criminals install ransomware? • Ransomware generates a pop-up window, webpage, or email warning from what looks like an official authority. • Ransomware is usually installed when you open A malicious email attachment Click a malicious link in an email message an instant message on social networking site • Ransomware can even be installed when you visit a malicious website.
  • 5. Types of Ransomware • Encryption Ransomware • Lock Screen Ransomware • Master Boot Record (MBR) Ransomware
  • 6. Encryption Ransomware • Encrypts personal files/folders (e.g., the contents of your My Documents folder - documents, spreadsheets, pictures, videos). • Files are deleted once they are encrypted and generally there is a text file in the same folder as the now-inaccessible files with instructions for payment. • You may see a lock screen but not all variants show one. • Instead you may only notice a problem when you attempt to open your files. • This type is also called 'file encryptor' ransomware.
  • 8. Lock Screen Ransomware • 'Locks' the screen and demands payment. • Presents a full screen image that blocks all other windows. • This type is called 'WinLocker' ransomware. • No personal files are encrypted.
  • 10. Master Boot Record (MBR) Ransomware • The Master Boot Record (MBR) is a section of the computer's hard drive that allows the operating system to boot up. • MBR ransomware changes the computer's MBR so the normal boot process is interrupted. • A ransom demand is displayed on screen instead.
  • 11. How to prevent ransomware ? • Keep all of the software on your computer up to date. • Make sure automatic updating is turned on to get all the latest Microsoft security updates and browser-related components (Java, Adobe, and the like). • Keep your firewall turned on. • Don't open spam email messages or click links on suspicious websites. (CryptoLocker spreads via .zip files sent as email attachments, for example.)
  • 12. Cont.. • Download Microsoft Security Essentials, which is free, or use another reputable antivirus and anti-malware program. • If you run Windows 8 or Windows RT, you don’t need Microsoft Security Essentials. • Scan your computer with the Microsoft Safety Scanner. • Keep your browser clean. • Always have a good backup system in place, just in case your PC does become infected and you can’t recover your files.
  • 13. Identify The Ransomeware Most commonly, ransomware is saved to one of the following locations: • C:Programdata(random alpha numerics).exe • C:Users(username)0.(random numbers).exe • C:UsersUsernameAppData(random alpha numerics).exe
  • 14. Removal – Microsoft Procedure The following Microsoft products can detect and remove this threat: • Windows Defender (built into Windows 8) • Microsoft Security Essentials • Microsoft Safety Scanner • Windows Defender Offline (Some ransomware will not allow you to use the products listed here, so you might have to start your computer from a Windows Defender Offline disk.)
  • 15. Conclusion When it comes to malware attacks, knowledge is the best possible weapon to prevent them. Be careful what you click!! Preventive measures should be taken before ransomwares establish strong hold. Keeping all the software updated and getting latest security updates might help to prevent the attacks. Use of antivirus and original software is highly recommended. Creating software restriction policy is the best tool to prevent a Cryptolocker infection in the first place in networks.
  • 16. References • http://www.microsoft.com/security/resources/ransomware-whatis.aspx • http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx • http://www.sophos.com/en-us/support/knowledgebase/119006.aspx • http://us.norton.com/ransomware • http://en.wikipedia.org/wiki/Ransomware