Crypto ransomware

8

Transcript of Crypto ransomware

Page 1: Crypto ransomware
Page 2: Crypto ransomware

Type of malware that encrypts files on victim’s

device using a cryptography and notifies their

encrypted files.

Hijacks and locks all the data in a device with an

unbreakable encryption and demands a huge amount

in bitcoins.

Page 3: Crypto ransomware

Does not steal victim’s sensitive information

Easy to produce and has a number of well

documented Crypto libraries.

Doesn’t try to remain stealthy after the encrypted

files as detection will not restore the lost data.

Page 4: Crypto ransomware

Installation

After Crypto-Ransomware infects a device, it

automatically gets installed.

Contacting Headquarter

Crypto-Ransomware contacts a server which is operated

by the criminal gang that owns it.

Page 5: Crypto ransomware

Handshake and Keys

The client and server of Ransomware identifies each

other through a generated handshake and two

cryptographic keys.

Encryption

Ransomware starts encrypting each and every file

available in a device.

Page 6: Crypto ransomware

Extortion

Ransomware displays a screen on a device giving a

time limit to pay up before the hackers destroy the

key to decrypt your files.

Page 7: Crypto ransomware

The best and the easiest way to stay safe from this

malware is to use web and email protection, and

use advanced endpoint security.

Page 8: Crypto ransomware