Top Banner
Pirating Cyber Style Ransomware
18

Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Dec 16, 2015

Download

Documents

Aleesha Stone
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Pirating Cyber Style

Ransomware

Page 2: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

What is Ransomware?HistoryCryptoLockerBlackHole Exploit Kit

Overview

Page 3: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Stops PC from RunningOften Called “FBI Moneypak” or “FBI Virus”Two Types

Lock Screen RansomwareLocks Screen so System Cannot be Used

Encryption RansomwareLocks Files so They Cannot be Accessed

Uses Scare TacticsGoal Extort Money from Victim

Ransomware

Page 4: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

PC Cyborg TrojanCreator Dr. Joseph PoppReleased 1989Encrypt All Files on C Drive

KrottenReleased 2006Disabled Nearly All FilesPreyed on Windows Directory

History

Page 5: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

WinLockOriginated in RussiaRestricts Access to SystemDisplays Pornographic Images

RevetonFirst Seen in 2012“Police Trojan”Engaged in Illegal ActivitySend Fee

History

Page 6: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

CryptoLockerFirst Seen 2013Use 2048-Bit RSA KeyPrivate Key Held Threatened EraseMost Common Infection Mode – E-Mail AttachmentWill Run in Safe Mode

History

Page 7: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

CryptoLocker

Page 8: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

CryptoLocker

Page 9: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Found to have used 2764 unique victim IP's contacting the sinkholed domains

Highest number was recorded on Wednesday October 16, with 1266 unique IP addresses

CryptoLocker

Page 10: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Top 30 countries infected

CryptoLocker

Page 11: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

CountermeasuresDo Not Open Attachments Unless Source is VerifiedUp-to-Date Antivirus – Maybe to LateConfigure System so CryptoLocker Cannot Run

Block Executables from Running in %AppData% DirectoryBlock Executables from Running in %AppData%\* DirectoryBlock WinRAR Attachments from Opening %Temp%\Rar\*.exeBlock 7zip Attachments from Opening %Temp%\7z\*.exeBlock WinZip Attachments from Opening %Temp%\wz*\*.exeBlock Built-in Zip Support from Opening %Temp%\*.zip\*.exe

CryptoLocker

Page 12: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Launched in late 2010 – Russian HackerCurrently Most Popular Exploit KitMySQL BackendAuto UpdateContains Many Recent Java ExploitsContains Exploit for CVE-2012-1889 (MS XML)

0-Day at the timeGood JavaScript ObfuscationMany Different Payloads can be Carried

BlackHole Exploit Kit

Page 13: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

How It Works:

BlackHole Exploit Kit

Page 14: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

August to September 2012 Payloads:

BlackHole Exploit Kit

Money Collecting

Information StealingClick Fraud

Page 15: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Best Option, Avoid Getting InfectedKeep Good Backups – Even in HomesAvoid Paying Ransom

Paying Only Encourages More Ransomware / Malware

Conclusions

Page 16: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

History:http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspxhttp://nakedsecurity.sophos.com/2013/02/26/technical-paper-exploring-the-history-and-technology-of-ransomware/http://www.computerweekly.com/news/2240102909/Ransomware-and-computer-blackmail-viruses-a-historyhttp://ezfimblog.com/2013/10/28/cryptolocker-rears-its-ugly-head-a-history-of-ransomware/http://www.theoaklandpress.com/lifestyle/20131103/how-to-break-your-computer-free-of-ransomware

References

Page 18: Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.

Blackhole:http://nakedsecurity.sophos.com/2012/03/29/exploring-the-blackhole-exploit-kit/http://nakedsecurity.sophos.com/exploring-the-blackhole-exploit-kit/http://krebsonsecurity.com/tag/blackhole-exploit-kit/http://nakedsecurity.sophos.com/2012/11/30/technical-paper-blackhole/http://nakedsecurity.sophos.com/2013/01/16/technical-paper-black-hole-2/http://media.blackhat.com/bh-us-12/Briefings/Jones/BH_US_12_Jones_State_Web_Exploits_Slides.pdf

References