ransomware, malware and viruses; how to protect yourself

137
Ransomware, Malware and Viruses; How to Protect Yourself Presented by Ben Jones Technical Stream One

Upload: others

Post on 25-Dec-2021

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses; How to Protect YourselfPresented by Ben Jones Technical Stream One

Page 2: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Agenda

Cybercrime – What, Why and How?

Prevention – Avoiding Infection

Recovery – Dealing With Infection

Page 3: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime1

Page 4: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

“Criminal activities carried out by means of a computer”

What is Cybercrime?

Page 5: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

“Criminal activities carried out by means of a computer”

Currently at a bigger risk than ever

What is Cybercrime?

Page 6: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

“Criminal activities carried out by means of a computer”

Currently at a bigger risk than ever

Over 140m new malware samples recorded in 2015

What is Cybercrime?

Page 7: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Estimated as a $400bn industry in 2015, rising to $2tn by 2019

The Numbers Behind Malware

Page 8: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Estimated as a $400bn industry in 2015, rising to $2tn by 2019

Typically, only 4% of malware alerts are investigated

The Numbers Behind Malware

Page 9: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Estimated as a $400bn industry in 2015, rising to $2tn by 2019

Typically, only 4% of malware alerts are investigated

Malware-laced emails claim victims within 82s on average

The Numbers Behind Malware

Page 10: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Virus

Forms of Malware

Page 11: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Virus

Bot

Forms of Malware

Page 12: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime The Internet Of Things

Page 13: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Virus

Bot

Rootkit

Forms of Malware

Page 14: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Virus

Bot

Rootkit

Trojan Horse

Forms of Malware

Page 15: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Virus

Bot

Rootkit

Trojan Horse

Worm

Forms of Malware

Page 16: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Virus

Bot

Rootkit

Trojan Horse

Worm

Ransomware

Forms of Malware

Page 17: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime Ransomware

“The ransomware is that good… To be honest, we often just advise people to pay the ransom”

-Joseph Bonavolonta

Page 18: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime Ransomware

“The ransomware is that good… To be honest, we often just advise people to pay the ransom”

-Joseph Bonavolonta

Page 19: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Ransomware can – and does – stop businesses functioning

Ransomware

Page 20: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Ransomware can – and does – stop businesses functioning

It’s effective and lucrative for attackers

Ransomware

Page 21: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime Ransomware – As A Service

Page 22: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime Ransomware – As A Service

Page 23: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Ransomware can – and does – stop businesses functioning

It’s effective and lucrative for attackers

“Safe” platforms like mobile, macOS, Linux etc. are viable

Ransomware

Page 24: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Ransomware can – and does – stop businesses functioning

It’s effective and lucrative for attackers

“Safe” platforms like mobile, macOS, Linux etc. are viable

Cryptolocker extorted around $30m in it’s first 100 days

Ransomware

Page 25: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Ransomware can – and does – stop businesses functioning

It’s effective and lucrative for attackers

“Safe” platforms like mobile, macOS, Linux etc. are viable

Cryptolocker extorted around $30m in it’s first 100 days

It will use your infrastructure against you!

Ransomware

Page 26: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

Ransomware can – and does – stop businesses functioning

It’s effective and lucrative for attackers

“Safe” platforms like mobile, macOS, Linux etc. are viable

Cryptolocker extorted around $30m in it’s first 100 days

It will use your infrastructure against you!

Impact caused by downtime can be significant

Ransomware

Page 27: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Cybercrime

How does ransomware execute itself?

Is it possible to tell when ransomware is encrypting files?

Isn’t it just bluffing?

What Does Ransomware Look Like In Action?

Page 28: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention2

Page 29: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Prevalent Methods of Attack In Education

These are the most common attack vectors RM have seen:

• Opened a malicious email attachment

Page 30: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Prevalent Methods of Attack In Education

These are the most common attack vectors RM have seen:

• Opened a malicious email attachment

• Browsed infected sites/ads with outdated plugin versions

Page 31: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Prevalent Methods of Attack In Education

These are the most common attack vectors RM have seen:

• Opened a malicious email attachment

• Browsed infected sites/ads with outdated plugin versions

• USB pen drive

Page 32: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Prevalent Methods of Attack In Education

These are the most common attack vectors RM have seen:

• Opened a malicious email attachment

• Browsed infected sites/ads with outdated plugin versions

• USB pen drive

Brute force attacks on RDP sessions have also been seen

Page 33: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Wired network points

Anti-Virus solution

Software

End users

Passwords

Page 34: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Wired network points

Anti-Virus solution

Software

End users

Passwords

Your security is only as strong as the weakest link in the chain

Page 35: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention What’s The Best Solution?

There’s no single “best solution” to malware prevention

Page 36: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention What’s The Best Solution?

There’s no single “best solution” to malware prevention

A balance of software, hardware and education works best

Page 37: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Page 38: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Firewalls and Security Appliances

Patches for bugs and security exploits

Page 39: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Firewalls and Security Appliances

Patches for bugs and security exploits

Default passwords

Page 40: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Firewalls and Security Appliances

Patches for bugs and security exploits

Default passwords

Ineffectively/incorrectly configured

Page 41: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Firewalls and Security Appliances

Patches for bugs and security exploits

Default passwords

Ineffectively/incorrectly configured

Unsupported and EoL products

Page 42: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Page 43: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Wireless Networks

Signal can reach outside your premises

Page 44: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Wireless Networks

Signal can reach outside your premises

Use secure methods of authentication and encryption

Page 45: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Wireless Networks

Signal can reach outside your premises

Use secure methods of authentication and encryption

Segregate guest networks from data network

Page 46: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Wireless Networks

Signal can reach outside your premises

Use secure methods of authentication and encryption

Segregate guest networks from data network

Use managed wireless rogue detection capabilities

Page 47: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Wired network points

Page 48: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Wired Network Points

Disconnect/Disable any unused network points

Page 49: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Wired Network Points

Disconnect/Disable any unused network points

Employ MAC address based port security

Page 50: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Wired network points

Anti-Virus solution

Page 51: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Anti-Virus Solution

Centralise management in large environments

Page 52: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Anti-Virus Solution

Centralise management in large environments

Definition updates

Page 53: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Anti-Virus Solution

Centralise management in large environments

Definition updates

Product updates

Page 54: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Anti-Virus Product Updates

“These vulnerabilities are as bad as it gets. They don’t require any user interaction…”

-Tavis Ormandy, Project Zero

Page 55: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Wired network points

Anti-Virus solution

Software

Page 56: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Software

Software patches often fix security flaws, they are important!

Page 57: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Software

Software patches often fix security flaws, they are important!

Flash Player and Java are often exploited for weaknesses

Page 58: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Software

Software patches often fix security flaws, they are important!

Flash Player and Java are often exploited for weaknesses

Make updating software part of regular NMTs

Page 59: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Software

Software patches often fix security flaws, they are important!

Flash Player and Java are often exploited for weaknesses

Make updating software part of regular NMTs

Macros are often exploited – disable them in Group Policy

Page 60: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Wired network points

Anti-Virus solution

Software

End users

Page 61: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention End Users

External storage (pen drives)

Page 62: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Pen Drives

Page 63: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention USB Pen Drive Study

Page 64: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Disabling External Drives

Block external drives by Group Policy Object

TEC4341616

Page 65: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention End Users

External storage (pen drives)

Personal devices

Page 66: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention End Users

External storage (pen drives)

Personal devices

Social Engineering

Page 67: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering

“You could spend a fortune purchasing technology and services… And your network infrastructure could still remain vulnerable to old-fashioned manipulation”-Kevin Mitnick

Page 68: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Psychology Of Social Engineering

Social engineers prey on basic human instincts:

Page 69: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Psychology Of Social Engineering

Social engineers prey on basic human instincts:

• Fear

Page 70: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Psychology Of Social Engineering

Social engineers prey on basic human instincts:

• Fear

• Obedience

Page 71: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Psychology Of Social Engineering

Social engineers prey on basic human instincts:

• Fear

• Obedience

• Urgency

Page 72: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Psychology Of Social Engineering

Social engineers prey on basic human instincts:

• Fear

• Obedience

• Urgency

• Sympathy

Page 73: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Psychology Of Social Engineering

Social engineers prey on basic human instincts:

• Fear

• Obedience

• Urgency

• Sympathy

• Greed

Page 74: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Psychology Of Social Engineering

Social engineers prey on basic human instincts:

• Fear

• Obedience

• Urgency

• Sympathy

• Greed

Often more than one of these emotions are combined

Page 75: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Phishing Emails

Page 76: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering – Cloned Web Sites

Page 77: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering – Cookies and Identity Theft

“Cookies are insecure, no matter what you do…‘Authentication cookies’ are often exploitable”

-Kevin Fu

Page 78: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering – Cookies & Identity Theft

Page 79: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering – Cookies & Identity Theft

Page 80: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering – Cookies & Identity Theft

Page 81: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering Countermeasures

EDUCATION!!!

https://www.sonicwall.com/phishing/

Page 82: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering Countermeasures

EDUCATION!!!

https://www.sonicwall.com/phishing/

Implement digital controls to mitigate/block risks

Page 83: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering Countermeasures

EDUCATION!!!

https://www.sonicwall.com/phishing/

Implement digital controls to mitigate/block risks

Destroy paper and digital records securely

Page 84: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering Countermeasures

EDUCATION!!!

https://www.sonicwall.com/phishing/

Implement digital controls to mitigate/block risks

Destroy paper and digital records securely

Employ the Principle of Least Privilege

Page 85: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Social Engineering Countermeasures

EDUCATION!!!

https://www.sonicwall.com/phishing/

Implement digital controls to mitigate/block risks

Destroy paper and digital records securely

Employ the Principle of Least Privilege

CC4 Networks – Check your privileged users!

Page 86: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Where Are You Vulnerable?

Firewalls, Security Appliances and Infrastructure

Wireless networks

Wired network points

Anti-Virus solution

Software

End users

Passwords

Page 87: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Passwords

Passwords are effectively the keys to your network

Page 88: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Passwords

Passwords are effectively the keys to your network

Encourage, enforce and follow good password practice

Page 89: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Passwords

Passwords are effectively the keys to your network

Encourage, enforce and follow good password practice

Enforcing too much complexity can make things worse

Page 90: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Passwords

Passwords are effectively the keys to your network

Encourage, enforce and follow good password practice

Enforcing too much complexity can make things worse

Consider using passphrases rather than passwords

Page 91: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention How Secure Is My Password?

Page 92: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention How Secure Is My Password?

T1ddles14

Page 93: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention How Secure Is My Password?

T1ddles14

4 Days

Page 94: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention How Secure Is My Passphrase?

Page 95: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention How Secure Is My Passphrase?

my cat is called tiddles

Page 96: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention How Secure Is My Passphrase?

my cat is called tiddles

4 Sextillion Years

Page 97: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Passwords

Passwords are effectively the keys to your network

Encourage, enforce and follow good password practice

Enforcing too much complexity can make things worse

Consider using passphrases rather than passwords

Password managers minimise risk from website hacks

Page 98: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Passwords

Passwords are effectively the keys to your network

Encourage, enforce and follow good password practice

Enforcing too much complexity can make things worse

Consider using passphrases rather than passwords

Password managers minimise risk from website hacks

Configure account lockouts for privileged accounts

Page 99: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Prevention Passwords

Treat your password like a toothbrush. Don’t let anyone else use it, and get a new one every six months.

-Clifford Stoll

Page 100: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery3

Page 101: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Despite All Best Efforts…

Prevention is still better than cure

Page 102: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Despite All Best Efforts…

Prevention is still better than cure

Typical mindset needs to change during an attack

Page 103: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Identify, Isolate, Remove, Restore

Identify the affected user and/or workstation

Page 104: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Identifying – File Ownership

Page 105: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Share And Storage Management

Page 106: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Share And Storage Management

Page 107: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Identify, Isolate, Remove, Restore

Identify the affected user and/or workstation

Disable the user account, and disconnect the PC

Page 108: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Identify, Isolate, Remove, Restore

Identify the affected user and/or workstation

Disable the user account, and disconnect the PC

Find out how the malware got in, and deal with it

Page 109: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Scanning Files and Websites

http://www.virustotal.com

Page 110: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Identify, Isolate, Remove, Restore

Identify the affected user and/or workstation

Disable the user account, and disconnect the PC

Find out how the malware got in, and deal with it

Rebuild infected PCs to remove all traces

Page 111: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Identify, Isolate, Remove, Restore

Identify the affected user and/or workstation

Disable the user account, and disconnect the PC

Find out how the malware got in, and deal with it

Rebuild infected PCs to remove all traces

Restore any affected network files from backup

Page 112: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery What If A Server Is Infected?

Server infections will require more careful planning

Page 113: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery What If A Server Is Infected?

Server infections will require more careful planning

Like PCs, servers should be disconnected from the network

Page 114: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery What If A Server Is Infected?

Server infections will require more careful planning

Like PCs, servers should be disconnected from the network

Depending on the severity, DR may be the fastest option

Page 115: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery What If A Server Is Infected?

Server infections will require more careful planning

Like PCs, servers should be disconnected from the network

Depending on the severity, DR may be the fastest option

Without a DR process, full recommissions may be required!

Page 116: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery What If A Server Is Infected?

Server infections will require more careful planning

Like PCs, servers should be disconnected from the network

Depending on the severity, DR may be the fastest option

Without a DR process, full recommissions may be required!

Check if a decryption tool exists as a last resort

Page 117: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Backup Considerations

Backups are the only guaranteed method of recovery

Page 118: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Backup Considerations

Backups are the only guaranteed method of recovery

Don’t rely on backups which are accessible on your LAN

Page 119: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Backup Considerations

Backups are the only guaranteed method of recovery

Don’t rely on backups which are accessible on your LAN

Follow the 3-2-1 rule

Page 120: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Backup Considerations

Backups are the only guaranteed method of recovery

Don’t rely on backups which are accessible on your LAN

Follow the 3-2-1 rule

Check regularly with test restores

Page 121: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Backup Considerations

Backups are the only guaranteed method of recovery

Don’t rely on backups which are accessible on your LAN

Follow the 3-2-1 rule

Check regularly with test restores

Backups only protect backed up servers, not workstations

Page 122: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Backup Considerations

Backups are the only guaranteed method of recovery

Don’t rely on backups which are accessible on your LAN

Follow the 3-2-1 rule

Check regularly with test restores

Backups only protect backed up servers, not workstations

Don’t rely on Shadow Copies, Snapshots or Cloud Sync!

Page 123: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Disk To Disk To Tape Backup Model

Page 124: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Recovery Disk To Disk To Cloud Backup Model

Page 125: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary5

Page 126: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary Cybercrime

Cybercrime can take many shapes and forms

Page 127: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary Cybercrime

Cybercrime can take many shapes and forms

The best method of prevention is to reduce the attack surface

Page 128: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary Cybercrime

Cybercrime can take many shapes and forms

The best method of prevention is to reduce the attack surface

It’s important to educate yourselves and others

Page 129: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary How Can RM Help?

Network Vulnerability Testing

Page 130: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary Network Vulnerability Testing

Page 131: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary How Can RM Help?

Network Vulnerability Testing

Free Online Safety Review

Page 132: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary Online Safety Review

http://bit.ly/2eKhWOG

Page 133: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary How Can RM Help?

Network Vulnerability Testing

Free Online Safety Review

Managed Anti-Virus Solutions

Page 134: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary How Can RM Help?

Network Vulnerability Testing

Free Online Safety Review

Managed Anti-Virus Solutions

Backup Solutions

Page 135: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary How Can RM Help?

Network Vulnerability Testing

Free Online Safety Review

Managed Anti-Virus Solutions

Backup Solutions

Secure Broadband

Page 136: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses/seminars

Summary

Think, then click.

Not the other way around.

Page 137: Ransomware, Malware and Viruses; How to Protect Yourself

Ransomware, Malware and Viruses; How to Protect YourselfPresented by Ben Jones Technical Stream One