SlideShare a Scribd company logo
1
The Rising Tide of Ransomware
John Shier
Senior Security Advisor
@john_shier
2
Ransomware
3
Ransomware Increasingly Troublesome
$209m cost of
ransomware attacks in the
first quarter of 2016
300% increase in
ransomware attacks
since 2015Source - Symantec
Ransomware Discoveries
4
Ransomware Attacks Are Pervasive
Ransomware Targets
• Businesses (Retail)
• Public agencies (Education,
Healthcare, Government, Law
Enforcement)
Systems Impacted
• Windows, Mac, Linux
• Android
5
The AIDS trojan
6
Fake AV
7
Out with the old, in with the new
FakeAV
Ransomware
8
Police locker
9
Cryptolocker
10
Cryptolocker BitCash
11
Petya
12
Spam
13
Spam
14
Phishing
15
Phishing
16
Return of the mac(ro)
17
HD phishing
18
Locky
19
Locky
20
Cryptowall
21
Paths to exclude
windows
temp
cache
sample pictures
default pictures
sample music
program files
program file (x86)
games
sample videos
user account privileges
packages
Files to exclude
help_your_files.txt
help_your_files.html
help_your_files.png
Iconcache.db
Thumbs.db
Extensions to exclude
exe
dll
pif
scr
sys
msi
msp
com
htl
cpa
msc
bat
cmd
scf
Cryptowall
22
Tips for preventing ransomware
1. Don’t enable macros.
2. Consider installing Microsoft Office viewers.
3. Be very careful about opening unsolicited attachments.
4. Don’t give yourself more login power than necessary.
5. Patch, patch, patch.
6. Train and retrain employees in your business.
7. Segment the company network.
8. Back up your files regularly and keep a recent backup off-site
RANSOM DOES NOT GUARANTEE YOUR DATA BACK
Kansas Heart Hospital was hit with a
ransomware attack on 18th of May 2016
It paid the ransom, but then attackers
tried to extort a second payment
Source: Network World
http://www.networkworld.com/article/3073495/security/kansas-heart-
hospital-hit-with-ransomware-paid-but-attackers-demanded-2nd-
ransom.html
FAIL PROOF RANSOMWARE PROTECTION
• Protection against ransomware
o Regular time-indexed snapshot backups
o Flexibility in backup frequency and data retention
policies
o Comprehensive data protection for endpoints and
cloud apps
o Offsite data storage (AWS/Microsoft Azure) options
• Recovering from ransomware intrusion
o 24/7 data access
o User/admin restore
o Locate suspicious files quickly on endpoints and
cloud apps
Ransomware
• Backup data
regularly
• Recover at the
device or file level
• Locate suspicious
files via search
You Can’t Prevent Ransomware Attacks, But You Can Protect Against It
TIME-INDEXED BACKUPS WITH CONFIGURABLE
GRANULAR CONTROLS
BACKUPS SHOULD BE COMPREHENSIVE
Mobile Devices – Smartphones and Tablets
Desktops and Laptops
Cloud Applications
IT/USER FILE LEVEL RESTORE FROM SNAPSHOTS
IT Initiated Restore
User Initiated Restore
RANSOMWARE FILE LEVEL SEARCH
SUMMARY AND KEY TAKEAWAYS
• Update your security software
o Anti-virus and anti-malware software
o Operating systems for all endpoints including desktops, laptops and
smartphones
o Patch, patch, patch.
• End-user awareness and education
• Protection against ransomware
o Proactive: Regular time-indexed snapshot backups
o Remediation: File level restore and search for infected files
• Trusted by over 4,000 enterprises
• Headquartered in Silicon Valley
• Worldwide offices and 24x7 support
• Among fastest growing data protection providers
30
ABOUT DRUVA
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]

More Related Content

PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PDF
Data Breaches: The Untold Story
PPTX
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
PPTX
Making Cloud Security Part of Your DNA Webinar Slides
PPT
VeriSign iDefense Security Intelligence Services
PPTX
Quantifying Cloud Risk for Your Corporate Leadership
PPTX
Big data in term of security measure
PPTX
The Definitive CASB Business Case Kit - Presentation
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Data Breaches: The Untold Story
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Making Cloud Security Part of Your DNA Webinar Slides
VeriSign iDefense Security Intelligence Services
Quantifying Cloud Risk for Your Corporate Leadership
Big data in term of security measure
The Definitive CASB Business Case Kit - Presentation

What's hot (20)

PDF
User and Entity Behavioral Analytics
PPTX
Cloud Security for Dummies Webinar — The Identity Edition
PDF
Machine Learning + AI for Accelerated Threat-Hunting
PPTX
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
PPTX
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
PPTX
A New Approach to Threat Detection: Big Data Security Analytics
PPTX
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
PDF
The Myths + Realities of Machine-Learning Cybersecurity
PPTX
Discovery of rest at data
PDF
How to Operationalize Big Data Security Analytics
PPTX
Netskope — Shadow IT Is A Good Thing
PPTX
Discovery of rest at data
PPTX
Random Decision Forests at Scale
PDF
Netskope Overview
PPTX
Data Masking With The Delphix Dynamic Data Platform
PDF
Symantec 2011 State of Cloud Survey - South Asia Findings
PDF
Symantec 2011 State of Cloud Survey
DOCX
Data security in cloud compu
PDF
Data Science for Cyber Risk
PDF
Cloud Security - What you Should Be Concerned About
User and Entity Behavioral Analytics
Cloud Security for Dummies Webinar — The Identity Edition
Machine Learning + AI for Accelerated Threat-Hunting
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
A New Approach to Threat Detection: Big Data Security Analytics
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
The Myths + Realities of Machine-Learning Cybersecurity
Discovery of rest at data
How to Operationalize Big Data Security Analytics
Netskope — Shadow IT Is A Good Thing
Discovery of rest at data
Random Decision Forests at Scale
Netskope Overview
Data Masking With The Delphix Dynamic Data Platform
Symantec 2011 State of Cloud Survey - South Asia Findings
Symantec 2011 State of Cloud Survey
Data security in cloud compu
Data Science for Cyber Risk
Cloud Security - What you Should Be Concerned About
Ad

Similar to Taking a Proactive Approach to Combat Ransomware [Druva Webinar] (20)

PDF
Ransomware - Information And Protection Guide - Executive Summary
PPTX
Defend Your Company Against Ransomware
PPTX
CTERA Minimizing the threat of Ransomware with enterprise file services
PPTX
Minimizing the threat of Ransomware with enterprise file services
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PPTX
Ransomware Resiliency, Recoverability and Availability
PDF
How To Prevent Ransomware
PPTX
440890252-RANSOMWARE.cybersecurity-ppt.pptx
PDF
Ransomware Prevention Guide
PPTX
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
PPTX
Malware Most Wanted: Security Ecosystem
PPT
The Role of Application Control in a Zero-Day Reality
PPTX
Ransomeware and malware power point presentation
PDF
Michelle K Webster: Malware - Cryptolocker Research Final
PDF
Identifying, Monitoring, and Reporting Malware
PPT
It's Your Move: The Changing Game of Endpoint Security
PDF
Cscu module 03 protecting systems using antiviruses
PPTX
Cyber Incident Response Proposed Strategies
PPTX
Spyware presentation by mangesh wadibhasme
PDF
The rise of malware(ransomware)
Ransomware - Information And Protection Guide - Executive Summary
Defend Your Company Against Ransomware
CTERA Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
Get Smart about Ransomware: Protect Yourself and Organization
Ransomware Resiliency, Recoverability and Availability
How To Prevent Ransomware
440890252-RANSOMWARE.cybersecurity-ppt.pptx
Ransomware Prevention Guide
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Malware Most Wanted: Security Ecosystem
The Role of Application Control in a Zero-Day Reality
Ransomeware and malware power point presentation
Michelle K Webster: Malware - Cryptolocker Research Final
Identifying, Monitoring, and Reporting Malware
It's Your Move: The Changing Game of Endpoint Security
Cscu module 03 protecting systems using antiviruses
Cyber Incident Response Proposed Strategies
Spyware presentation by mangesh wadibhasme
The rise of malware(ransomware)
Ad

More from Druva (20)

PDF
Druva’s 2017 Ransomware Survey
PDF
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
PDF
New Strategies for More Effective Remote/Branch Office Data Protection
PPTX
4 ways to cut your e discovery costs in half-webinar-exterro-druva
PDF
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
PDF
Rethink Server Backup and Regain Control
PDF
20 point checklist : why move backup and disaster recovery to the cloud - druva
PDF
Getting a clue: uncovering the truth about your data with mobile forensics
PDF
Interested in working at Druva?
PDF
Where in the world is your PII and other sensitive data? by @druva inc
PDF
Black Hat 2015 Survey: The Challenge of Data Sprawl
PDF
Where In The World Is Your Sensitive Data?
PDF
Soundbytes from the Frontlines
PDF
The state of data privacy with dimensional research
PDF
Security and privacy of cloud data: what you need to know (Interop)
PDF
Enterprise Data Privacy Quiz
PDF
Data Privacy Readiness Test
PDF
AWS reInvent: Building an enterprise class backup and archival solution on AWS
PDF
Why You Need Enterprise Backup
PDF
CIO Cloud Security Checklist
Druva’s 2017 Ransomware Survey
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
New Strategies for More Effective Remote/Branch Office Data Protection
4 ways to cut your e discovery costs in half-webinar-exterro-druva
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Rethink Server Backup and Regain Control
20 point checklist : why move backup and disaster recovery to the cloud - druva
Getting a clue: uncovering the truth about your data with mobile forensics
Interested in working at Druva?
Where in the world is your PII and other sensitive data? by @druva inc
Black Hat 2015 Survey: The Challenge of Data Sprawl
Where In The World Is Your Sensitive Data?
Soundbytes from the Frontlines
The state of data privacy with dimensional research
Security and privacy of cloud data: what you need to know (Interop)
Enterprise Data Privacy Quiz
Data Privacy Readiness Test
AWS reInvent: Building an enterprise class backup and archival solution on AWS
Why You Need Enterprise Backup
CIO Cloud Security Checklist

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
medical staffing services at VALiNTRY
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
System and Network Administraation Chapter 3
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
System and Network Administration Chapter 2
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Nekopoi APK 2025 free lastest update
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Digital Strategies for Manufacturing Companies
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
Online Work Permit System for Fast Permit Processing
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
medical staffing services at VALiNTRY
Internet Downloader Manager (IDM) Crack 6.42 Build 41
System and Network Administraation Chapter 3
Adobe Illustrator 28.6 Crack My Vision of Vector Design
VVF-Customer-Presentation2025-Ver1.9.pptx
System and Network Administration Chapter 2
Operating system designcfffgfgggggggvggggggggg
Design an Analysis of Algorithms I-SECS-1021-03
Wondershare Filmora 15 Crack With Activation Key [2025
Nekopoi APK 2025 free lastest update
L1 - Introduction to python Backend.pptx
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Digital Strategies for Manufacturing Companies
Which alternative to Crystal Reports is best for small or large businesses.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
ai tools demonstartion for schools and inter college
Online Work Permit System for Fast Permit Processing

Taking a Proactive Approach to Combat Ransomware [Druva Webinar]

  • 1. 1 The Rising Tide of Ransomware John Shier Senior Security Advisor @john_shier
  • 3. 3 Ransomware Increasingly Troublesome $209m cost of ransomware attacks in the first quarter of 2016 300% increase in ransomware attacks since 2015Source - Symantec Ransomware Discoveries
  • 4. 4 Ransomware Attacks Are Pervasive Ransomware Targets • Businesses (Retail) • Public agencies (Education, Healthcare, Government, Law Enforcement) Systems Impacted • Windows, Mac, Linux • Android
  • 7. 7 Out with the old, in with the new FakeAV Ransomware
  • 16. 16 Return of the mac(ro)
  • 21. 21 Paths to exclude windows temp cache sample pictures default pictures sample music program files program file (x86) games sample videos user account privileges packages Files to exclude help_your_files.txt help_your_files.html help_your_files.png Iconcache.db Thumbs.db Extensions to exclude exe dll pif scr sys msi msp com htl cpa msc bat cmd scf Cryptowall
  • 22. 22 Tips for preventing ransomware 1. Don’t enable macros. 2. Consider installing Microsoft Office viewers. 3. Be very careful about opening unsolicited attachments. 4. Don’t give yourself more login power than necessary. 5. Patch, patch, patch. 6. Train and retrain employees in your business. 7. Segment the company network. 8. Back up your files regularly and keep a recent backup off-site
  • 23. RANSOM DOES NOT GUARANTEE YOUR DATA BACK Kansas Heart Hospital was hit with a ransomware attack on 18th of May 2016 It paid the ransom, but then attackers tried to extort a second payment Source: Network World http://www.networkworld.com/article/3073495/security/kansas-heart- hospital-hit-with-ransomware-paid-but-attackers-demanded-2nd- ransom.html
  • 24. FAIL PROOF RANSOMWARE PROTECTION • Protection against ransomware o Regular time-indexed snapshot backups o Flexibility in backup frequency and data retention policies o Comprehensive data protection for endpoints and cloud apps o Offsite data storage (AWS/Microsoft Azure) options • Recovering from ransomware intrusion o 24/7 data access o User/admin restore o Locate suspicious files quickly on endpoints and cloud apps Ransomware • Backup data regularly • Recover at the device or file level • Locate suspicious files via search You Can’t Prevent Ransomware Attacks, But You Can Protect Against It
  • 25. TIME-INDEXED BACKUPS WITH CONFIGURABLE GRANULAR CONTROLS
  • 26. BACKUPS SHOULD BE COMPREHENSIVE Mobile Devices – Smartphones and Tablets Desktops and Laptops Cloud Applications
  • 27. IT/USER FILE LEVEL RESTORE FROM SNAPSHOTS IT Initiated Restore User Initiated Restore
  • 29. SUMMARY AND KEY TAKEAWAYS • Update your security software o Anti-virus and anti-malware software o Operating systems for all endpoints including desktops, laptops and smartphones o Patch, patch, patch. • End-user awareness and education • Protection against ransomware o Proactive: Regular time-indexed snapshot backups o Remediation: File level restore and search for infected files
  • 30. • Trusted by over 4,000 enterprises • Headquartered in Silicon Valley • Worldwide offices and 24x7 support • Among fastest growing data protection providers 30 ABOUT DRUVA