Ransomware
Trade Association of Information Technology (TAIT)
Knowledge Series
Joel Divekar
Mumbai
18th Nov 2016
What is Ransomware ?
Is a type of Malware,
that infects a computer
&
restricts access to it
until a ransom is paid to unlock it
How did it start ?
In 1989, a floppy disk labelled
“AIDS information – Introductory Diskette”
was distributed to
20,000 participants from 90 countries
after WHO International AIDS conference
And ...
The “AIDS Trojan” transmitted with use floppy disk
got activated after 90 reboots ....
and encrypted all the victim’s data ....
Asking them to pay $189 to an address in Panama
With a message ...
How did it come in my system?
Phishing emails containing malicious attachments
Downloading malicious files
Clicking on malicious ads
Unknowingly visiting an infected website which
downloads and installs malware
Web-based IM applications
Exploiting Web Servers to gain access into an
Organisation’s network
Ransomware after effects
Creates fear and panic
Tricks user to click on links
Ask to pay a Ransom
What happens to infected system
System infected with Ransomware
may also get infected by other malware
In case of Cryptolocker,
the malicious attachment also contains
Uparte, a downloader,
which infects the system with
GameOver Zeus Trojan
which steals users banking information
Should I pay Ransom?
Paying Ransom does not guarantee
that you would get your files back
Decryption of files does not mean
your system is not infected with malware
How2 avoid Ransomware ?
Use tools to filter unwanted mails
Use Ad blockers to block malacious ads
Install Firewall, AntiVirus,
AntiMalware & AntiRansonware
Update and patch system and applications
Most important ... Do daily data backup
Use IT Automation tools extensively
Thanks
Joel Divekar
Mumbai, India
+91 9920208223
joeldivekar.blogspot.com
www.linkedin.com/in/joeldivekar
www.slideshare.net/JoelDivekar
IT Automation / DevOps / Software Development / Training

More Related Content

PPTX
The malware effects
PPT
ISDD - Security Risks
PPTX
Trojan Horse Virus and Hacking
PPTX
The trojan horse virus
PPT
ISDD Hacking and Viruses
PPTX
Seminar On Trojan Horse
PPT
Malware, Trojans and Slurpware
PPTX
Torjan horse virus
The malware effects
ISDD - Security Risks
Trojan Horse Virus and Hacking
The trojan horse virus
ISDD Hacking and Viruses
Seminar On Trojan Horse
Malware, Trojans and Slurpware
Torjan horse virus

What's hot (19)

PPT
The Trojan Horse (Computing)
PPTX
Trojan virus & backdoors
PPTX
Impact of ict on siocety virus
PDF
The rise of malware(ransomware)
PPTX
Is your system infected by tatanga trojan?
PDF
Wanna cry ransomware cyber security awareness
PPTX
RANSOMWARE
PPTX
Ransomware Attack
PPT
Virus (Trojan Horse,Salami Attack)
PPTX
Ransomeware
PPTX
BackDoors Seminar
PPT
Backdoor
DOCX
What is Malware?
PPTX
Internet Threats: Carlo Alvarez
PPTX
Safety, Security and Ethics
PPT
Trojan Horse Virus
PPTX
Internet threats
PPTX
Impact of ict on society virus
PPTX
Cyber crime
The Trojan Horse (Computing)
Trojan virus & backdoors
Impact of ict on siocety virus
The rise of malware(ransomware)
Is your system infected by tatanga trojan?
Wanna cry ransomware cyber security awareness
RANSOMWARE
Ransomware Attack
Virus (Trojan Horse,Salami Attack)
Ransomeware
BackDoors Seminar
Backdoor
What is Malware?
Internet Threats: Carlo Alvarez
Safety, Security and Ethics
Trojan Horse Virus
Internet threats
Impact of ict on society virus
Cyber crime
Ad

Viewers also liked (20)

ODP
11 Tools for your Open Source devops stack
PPTX
Neuswyft presentation 2.12
PDF
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
PPTX
Blockchain Technology
PPTX
Introduction to blockchain
PDF
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
PDF
Technology tipping points Big Data and Blockchain use case presentation
PPTX
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
PDF
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
PDF
Innovation in the Modern Supply Chain
PDF
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
PDF
Introduction to Blockchain
PPTX
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
PDF
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
PDF
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
PDF
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
PDF
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
PPTX
Blockchain, Predictive Analytics and Healthcare
PDF
2017 Top Issues - Financial Reporting Modernization - January 2017
PPTX
Blockchain: The Information Technology of the Future
11 Tools for your Open Source devops stack
Neuswyft presentation 2.12
DevSecCon Asia 2017: Guillaume Dedrie: A trip through the securitiy of devops...
Blockchain Technology
Introduction to blockchain
Estonia E-Residency: Country as a Service - BigchainDB & IPDB Meetup #3 - Fe...
Technology tipping points Big Data and Blockchain use case presentation
BitCoin, BlockChain, más criaturas fantásticas, y donde utilizarlas
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
Innovation in the Modern Supply Chain
Τάσεις στο χώρο του mobile - 3ο Τετράμηνο ᾽16 : Εισοδηματικά μοντέλα και πλατ...
Introduction to Blockchain
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
14 Jan17- Nullmeets -Blockchain concept decoded by Ninad Sarang
Chain Reaction: How Blockchain Technology Might Transform Wholesale Insurance
Blockchain Beyond Finance - Cronos Groep - Jan 17, 2017
Blockchain, Predictive Analytics and Healthcare
2017 Top Issues - Financial Reporting Modernization - January 2017
Blockchain: The Information Technology of the Future
Ad

Similar to Ransomware - TAIT knowledge Series (20)

PPTX
Types of malware threats
PPTX
Kinds of Online-WPS empowerment technologies
DOCX
External threats to information system: Malicious software and computer crimes
PDF
Malwares
PPTX
Details of Malwareand Their Types with pptx
PPTX
Guest Lecture-Computer and Cyber Security.pptx
PPTX
Malicious software group 24
PPTX
Computer viruses
DOCX
trojon horse Seminar report
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPTX
Ransomware
PPTX
Ransomware by lokesh
PPT
Cybercrime 1
PPTX
KINDS OF ONLINE THREATS.pptx
PPTX
Ethical hacking trojans, worms and spyware
PPTX
External threats-to-information-system
PPTX
Ransomware
PPT
How safe is your computer?
PPT
Computers Diseases
PPTX
Presentation on computer virus
Types of malware threats
Kinds of Online-WPS empowerment technologies
External threats to information system: Malicious software and computer crimes
Malwares
Details of Malwareand Their Types with pptx
Guest Lecture-Computer and Cyber Security.pptx
Malicious software group 24
Computer viruses
trojon horse Seminar report
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Ransomware
Ransomware by lokesh
Cybercrime 1
KINDS OF ONLINE THREATS.pptx
Ethical hacking trojans, worms and spyware
External threats-to-information-system
Ransomware
How safe is your computer?
Computers Diseases
Presentation on computer virus

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Architecture types and enterprise applications.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPT
Geologic Time for studying geology for geologist
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Hybrid model detection and classification of lung cancer
PDF
CloudStack 4.21: First Look Webinar slides
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Unlock new opportunities with location data.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
Developing a website for English-speaking practice to English as a foreign la...
A contest of sentiment analysis: k-nearest neighbor versus neural network
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Zenith AI: Advanced Artificial Intelligence
Architecture types and enterprise applications.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Geologic Time for studying geology for geologist
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Getting Started with Data Integration: FME Form 101
Hybrid model detection and classification of lung cancer
CloudStack 4.21: First Look Webinar slides
Module 1.ppt Iot fundamentals and Architecture
Assigned Numbers - 2025 - Bluetooth® Document
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
sustainability-14-14877-v2.pddhzftheheeeee
WOOl fibre morphology and structure.pdf for textiles
Unlock new opportunities with location data.pdf
A review of recent deep learning applications in wood surface defect identifi...

Ransomware - TAIT knowledge Series

  • 1. Ransomware Trade Association of Information Technology (TAIT) Knowledge Series Joel Divekar Mumbai 18th Nov 2016
  • 2. What is Ransomware ? Is a type of Malware, that infects a computer & restricts access to it until a ransom is paid to unlock it
  • 3. How did it start ? In 1989, a floppy disk labelled “AIDS information – Introductory Diskette” was distributed to 20,000 participants from 90 countries after WHO International AIDS conference
  • 4. And ... The “AIDS Trojan” transmitted with use floppy disk got activated after 90 reboots .... and encrypted all the victim’s data .... Asking them to pay $189 to an address in Panama
  • 6. How did it come in my system? Phishing emails containing malicious attachments Downloading malicious files Clicking on malicious ads Unknowingly visiting an infected website which downloads and installs malware Web-based IM applications Exploiting Web Servers to gain access into an Organisation’s network
  • 7. Ransomware after effects Creates fear and panic Tricks user to click on links Ask to pay a Ransom
  • 8. What happens to infected system System infected with Ransomware may also get infected by other malware In case of Cryptolocker, the malicious attachment also contains Uparte, a downloader, which infects the system with GameOver Zeus Trojan which steals users banking information
  • 9. Should I pay Ransom? Paying Ransom does not guarantee that you would get your files back Decryption of files does not mean your system is not infected with malware
  • 10. How2 avoid Ransomware ? Use tools to filter unwanted mails Use Ad blockers to block malacious ads Install Firewall, AntiVirus, AntiMalware & AntiRansonware Update and patch system and applications Most important ... Do daily data backup Use IT Automation tools extensively
  • 11. Thanks Joel Divekar Mumbai, India +91 9920208223 joeldivekar.blogspot.com www.linkedin.com/in/joeldivekar www.slideshare.net/JoelDivekar IT Automation / DevOps / Software Development / Training