This is 1qaz2ws
my data 3edc4rfv
5tgb6yhn
7ujm8ikm
Key Encryption
plain text cipher text
Algorithm
This is 1qaz2ws
my data 3edc4rfv Internet
5tgb6yhn
7ujm8ikm
Decryption
plain text Algorithm cipher text
+
Key
ENCRYPTION: PRACTICAL USE
OpenVPN HTTP
USA Singapore
USA
ENCRYPTION: PRACTICAL USE
• What is Ransomware?!
• Malware that can hold your computer and/or its data hostage
• Your computer and/or data is “freed” in exchange for money
• Premium SMS
• Bitcoin
• Western Union
• Two general types:
• Lock screen
• Encrypting ransomware
RANSOMWARE
Example: Teslacrypt
HOW DID THIS HAPPEN?!
Source: Proofpoint
RANSOMWARE: THE FALLOUT
Source: Symantec
RANSOMWARE: STATISTICS
Average Ransom Amount (by year)
Source: Symantec
Almost 2/3 of Submitted Exploits have Ransomware Payloads
• Effective
WHY?
• Lucrative
Source: Malwarebytes
RANSOMWARE: TRENDS
600%
Source: Proofpoint
Android Ransomware from 4/2014 to 3/2016
136,532
Phones
Source: Kaspersky
NOW WHAT?!!
• Don’t Pay!
• Doesn’t guarantee you will get your computer and/or data back
• Funds sent will be used to target you and others further
• Isolate infected computer from rest of the network
• Restore files from known good backup
• Do you even have one???
• Submit malware to antivirus solution so signatures can be created
RANSOMWARE: HOW TO AVOID IT?
• Encryption when utilized to secure sensitive data and computer systems can be
extremely effective
• Cyber criminals have matured in parallel with IT experts and consistently discover
innovative methods to gain unauthorized access to your data
• Using encryption, criminals can hold your computers and data hostage until monetary
demands are met
• Ransomware is becoming the #1 issue among IT security professionals worldwide
QUESTIONS
THANK YOU!
Scott Pearson
US Department of State
Anti-Terrorism Assistance Program
spearson47@gmail.com