ICTTF - Ransomware Uncovered - Specialist Certificate

ICTTF - Ransomware Uncovered - Specialist Certificate

black swan event - is an unprecedented event that becomes quite normal.

![](/img/user/Attachments/Pasted image 20230210102915.png)

![](/img/user/Attachments/Pasted image 20230210103215.png)

first ransomware - 1989 - name ATOS

malvertsiging

LOCK - 2016 > load to memory > delets itself > encrypt storage by pattern > encrypt network storage > delte volume snapshots > change wallpaper

bitcoin for payment

ransomware as a service

Dodge bullet - 2017

there is ransomew for - Mobile device - PC - TV - IOT

CONTI - HSE - Ransomware - they offer proof of life

How to defend againt ransomware ?

rveryone need to take care for their enviroment

![](/img/user/Attachments/Pasted image 20230210111001.png)

![](/img/user/Attachments/Pasted image 20230210111018.png)

![](/img/user/Attachments/Pasted image 20230210111044.png)

Talk to the board

![](/img/user/Attachments/Pasted image 20230210111144.png)

anti virus / edt - installed up to date and monitored

![](/img/user/Attachments/Pasted image 20230210111311.png)

Need to do cyber risk assesment

Cyber Hygiene

How to Respond

Tips

What is the primary motivation of cyber criminals?
Money

Generally what level of skills do state sponsored threat actors have?
Very high

Underground Economy of Cybercrime: Who are the "People Persons"?
Organisational Leaders

A type of malicious software designed to carry out or facilitate illegal online activity is called?
Crimeware

The Fifth Domain Refers to Warfare on What Front?
Cyber Space

The network of physical objects—a.k.a. "things"—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet
IoT - Internet of Things

A stealthy surgical cyber threat actor, typically a nation state or state-sponsored group, which gains unauthorised access to a computer network and remains undetected for an extended period.
APT - Advanced Persistent Threat

Stage 10 of the Cyber Kill Chain
Protect

The Year of the First Ransomware - AIDS
1989

The Three Main Delivery Channels of Ransomware (Select 3 Answers)
Phising
Malvertising
Drive by infection

The process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.
Encryption

A digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a ledger existing in a form of a computerized database using strong cryptography to secure transaction records, to control the creation of additional coins, and to verify the transfer of coin ownership. Example Bitcoin
Cryptocurrency

The Number of Functions in the NIST Cyber Security Framework
5

Name the NIST Function: What techniques can contain impacts of incidents
Respond

An information security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions.
The principle of least privilege (PoLP)

A Cyber Hygiene Tip
Patch

Ransomware Response Tip
ID The Malware

The act or practice of splitting a computer network into subnetworks, each being a network segment.
Network Segmentation

The Web Address for the "No More Ransom" Project
www.nomoreransom.org

What you should NEVER do if you are the victim of ransomware
Panic