ABSTRACT Ransomware Attacks Are Evolving and Becoming More and More Complicated

Total Page:16

File Type:pdf, Size:1020Kb

ABSTRACT Ransomware Attacks Are Evolving and Becoming More and More Complicated ABSTRACT Ransomware attacks are evolving and becoming more and more complicated. This guide will review the current state of ransomware to help you understand how companies are profiled for attacks, what you RANSOMWARE can do to prevent an attack, and what to do if you become a victim. Limit the Risk Table of Contents About Peters & Associates ........................................................................................................................ 2 Who we are ............................................................................................................................................. 2 About the Author ...................................................................................................................................... 2 Contact Us ................................................................................................................................................. 2 Introduction ................................................................................................................................................. 3 What is Ransomware? ................................................................................................................................ 4 How is Ransomware Spread? ................................................................................................................ 4 Characteristics of Ransomware ............................................................................................................. 6 Features of Ransomware ....................................................................................................................... 6 Top Known Types of Ransomware and What They Do3 ........................................................................ 7 Payments for Ransomware ........................................................................................................................ 9 Should you pay the ransom? ................................................................................................................ 9 What are the benefits of paying? ......................................................................................................... 9 What are the risks? ................................................................................................................................. 9 Didn’t have a good restore copy and have to pay the ransom? ...................................................... 9 What Do Hackers Want from Me? ......................................................................................................... 10 The Evolution of Cybercrimes ............................................................................................................. 11 Ransom Negotiation ............................................................................................................................ 11 The Focus ............................................................................................................................................... 11 New Targets and Threats ..................................................................................................................... 11 Latest Ransomware – March 2017 ..................................................................................................... 13 Prevention .................................................................................................................................................. 15 Infected with Ransomware – Next Steps ............................................................................................... 19 Don’t have a good backup file? .......................................................................................................... 19 Testimonials about our Support Services .......................................................................................... 21 Not sure where to start? ...................................................................................................................... 22 References ................................................................................................................................................. 23 Peters.com Ransomware Guide – Limit the Risk 1 | Page About Peters & Associates Who we are The key to solving problems is to listen closely and ask the right questions. At Peters & Associates, we listen first. We’ve been successfully partnering with our clients this way for over three decades - solving challenges and building bridges to a better future with secure, scalable IT solutions aligned with your business needs and goals. Our resources are skilled and certified in network, systems, and cloud services, including: CompTIA A+/Network/Server, VMWare Certified (VCP), Apple (ACTS), MCP, MCPD, MCSE, MCSA, MCTS, ACCP, CCNA, CCDA, CIOSSS, CQFS, CVPNS, CCP, CCNP, CCA, MCDBA, MCTTP- DBA, NTSP, NSA, CISM, CISA, CRISC, ITIL, and NIST. About the Author Galaxia Martin is the Director of Support Services responsible for support and security services operations within the support desk. Galaxia has worked in the IT industry for over 15 years in financial, accounting, and software development businesses. She has designed and led organizational innovations as well as optimized and increased growth within support operations. She understands the complexity of business operations and has experience with aligning business initiatives with cost reduction solutions. As an Information Technology expert, Galaxia continues to research and study the latest technology, cyber risks, and industry trends to help educate her clients. Galaxia has a Master’s degree in Information Systems with additional studies in marketing and arts. Contact Us Peters & Associates 1801 S. Meyers Rd., Suite 120 Oakbrook Terrace, IL 60181 630.832.0075 Ι www.peters.com For more information: [email protected] Peters.com Ransomware Guide – Limit the Risk 2 | Page Introduction Ransomware is not going away and, in fact, is changing day by day, hour by hour, and minute by minute. What can you do to avoid the risk? There are several methods, actions, and opinions on proactive measures you can take, but the reality is that it is not if you will be affected, but when. Imagine that you live in an area where natural disasters are common; there are specific activities you would do to prepare for that specific type of disaster, right? It’s the same when we (as good cybercrime fighters) tell you the types of risks out there and what methods can help you reduce your risk. It’s all about being prepared. You have something valuable to cybercriminals - we all do. Cybercrime is no longer just about putting skimmers on ATMs or trying to steal your mail from your mailbox. It has literally gone “pro,” meaning cybercriminals are using more sophisticated technology to get your data. The internet has gone wild in terms of cybercrime, so we all must take responsibility to protect ourselves against it on a regular basis. This Ransomware Guide will help you understand what ransomware is, how to protect yourself, and the trends that are occurring. Remember this is a guide - not an end-all-be-all to ending ransomware. The fact is that ransomware will evolve and so will our methods to prevent it. So, let’s get started on learning more about the present state of ransomware and how we can help you become a rock star cybercriminal fighter! Peters.com Ransomware Guide – Limit the Risk 3 | Page What is Ransomware? Ransomware is a form of cyberattack used to obtain your data and gain payment. There are a few more common types or families that we will share with you in this guide. Ransomware predominantly uses the AES algorithm to encrypt files, though some use alternative methods as well. The standard ransomware rate is $500 per incident, but that is expected to double or triple as many organizations keep paying the demands. How is Ransomware Spread? Ransomware is spread through the distribution of malicious files. Typically, this is done through social engineering, and studies have shown that about 42.6% is done through email. Most people assume that hackers are specifically targeting their company’s data for something like WikiLeaks. This is NOT the focus for most hackers - the main reason they want access to your environment is to lock down your data and have you pay them ransom money. 1 Peters.com Ransomware Guide – Limit the Risk 4 | Page The most common ways a hacker can access your network are the following:2 1. Phishing – good old social engineering at its best The most common way to access your network is through your employees, and hackers are getting smarter about how to target them. Some are using common tools like LinkedIn to connect and then send them hyperlinks to malicious websites, while others are still using standard phishing emails. The new trend for these attacks is encrypted emails. Cybercriminals can send an encrypted message that appears to be from a legitimate contact (they do their research) and when your employee unencrypts it the malicious activity begins. 2. Buffer Overflow Another way to access your network is through your website forms. Yes, they can basically hack your website forms to steal data, cause damage, or access your network. 3. Password Hacking Still using default passwords for your computer, modem, or Wi-Fi router? Well, sorry to tell you the hackers can get them. Most of the default passwords for any hardware are available to even the most amateur of hackers. So make sure you change your default passwords
Recommended publications
  • The Evolution of Ransomware
    The evolution of ransomware SECURITY RESPONSE The evolution of ransomware Kevin Savage, Peter Coogan, Hon Lau Version 1.0 – August 6, 2015 Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. CONTENTS OVERVIEW ..............................................................................3 Key information ......................................................................5 Types of ransomware .............................................................5 How ransomware has evolved ...............................................7 Targets for ransomware .......................................................13 Systems impacted by ransomware ......................................14 Ransomware: How it works ..................................................18 Ransom techniques ..............................................................27 How widespread is the problem of ransomware .................33 What does the future hold for ransomware? .......................37 Conclusion ............................................................................45 Appendix ..............................................................................47 Mitigation strategies ............................................................51 Symantec detections for common ransomware families 54 Resources .............................................................................56 OVERVIEW Never before in the history of human kind have people across the world been
    [Show full text]
  • ESET Observed That the Focus of Android Ransomware Operators Cybercriminals, Even Though It Had Been Around for Many Years Before
    TRENDS IN ANDROID RANSOMWARE Authors Robert Lipovský – Senior Malware Researcher Lukáš Štefanko – Detection Engineer Gabriel Braniša – Malware Researcher The Rise of Android Ransomware Contents SUMMARY 2 RANSOMWARE ON ANDROID 2 Common infection vectors 3 Malware c&c communication 3 Malware self-protection 4 ANDROID RANSOMWARE CHRONOLOGY 5 Android defender 5 Ransomware meets fake av, meets…porn 7 Police ransomware 8 Simplocker 9 Simplocker distribution vectors 9 Simplocker in English 10 Lockerpin 11 Lockerpin’s aggressive self–defense 12 Jisut 13 Charger 15 HOW TO KEEP YOUR ANDROID PROTECTED 15 – 1 – The Rise of Android Ransomware SUMMARY RANSOMWARE ON ANDROID 2016 brought some interesting developments to the Android ransomware Ransomware, as the name suggests, is any type of malware that demands scene Ransomware is currently one of the most pressing cybersecurity a sum of money from the infected user while promising to “release” issues across all platforms, including the most popular mobile one a hijacked resource in exchange There are two general categories of malware that fall under the “ransomware” label: Authors of lock-screen types as well as file-encrypting “crypto-ransomware” have used the past 12 months to copycat effective techniques from desktop • Lock-screen ransomware malware, as well as develop their own sophisticated methods specialized • Crypto-ransomware for targets running Android devices In lock-screen types of ransomware, the hijacked resource is access to the In addition to the most prevalent scare tactics used by lock-screen
    [Show full text]
  • A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics PH.D THESIS Platon Pantelis Kotzias Copyright c 2019 by Platon Pantelis Kotzias iv DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor of Philosophy in Software, Systems and Computing Author: Platon Pantelis Kotzias Advisor: Dr. Juan Caballero April 2019 Chair/Presidente: Marc Dasier, Professor and Department Head, EURECOM, France Secretary/Secretario: Dario Fiore, Assistant Research Professor, IMDEA Software Institute, Spain Member/Vocal: Narseo Vallina-Rodriguez, Assistant Research Professor, IMDEA Networks Institute, Spain Member/Vocal: Juan Tapiador, Associate Professor, Universidad Carlos III, Spain Member/Vocal: Igor Santos, Associate Research Professor, Universidad de Deusto, Spain Abstract of the Dissertation Potentially unwanted programs (PUP) are a category of undesirable software that, while not outright malicious, can pose significant risks to users’ security and privacy. There exist indications that PUP prominence has quickly increased over the last years, but the prevalence of PUP on both consumer and enterprise hosts remains unknown. Moreover, many important aspects of PUP such as distribution vectors, code signing abuse, and economics also remain unknown. In this thesis, we empirically and sys- tematically analyze in both breadth and depth PUP abuse, prevalence, distribution, and economics. We make the following four contributions. First, we perform a systematic study on the abuse of Windows Authenticode code signing by PUP and malware.
    [Show full text]
  • Solution Brief Recovering from Ransomware with Barracuda Backup
    Solution Brief Recovering from Ransomware with Barracuda Backup Ransomware is a malware variant that locks an end user’s computer or encrypts their files, then demands a sum of money to allow access or decryption. What’s worse, if an organization hands over the cash, there are often times when the attacker doesn’t play nice and still withholds the key even after payment. Ransomware is problematic for businesses because it not only results in financial loss, but also tainted credibility and lost productivity. However, this situation can be avoided if your organization has taken the steps to implement a ransomware prevention plan. In this solution brief, we will discuss some of the steps you can take to prevent ransomware attacks, as well as how to quickly recover from them using Barracuda Backup. Introduction Due to the sophistication of today’s threat landscape, ransomware can be difficult to catch right at the door. Once this malicious malware crosses the threshold, a business user is hit by a daunting message, informing the user that their computer and files have been seized, and payment is required. What’s equally perturbing is that ransomware doesn’t discriminate—it can happen to the mom and pop shops to large enterprises. It’s not a matter of if a business will get hit, but when. Protecting Your Organization from Ransomware Attackers have created many different variations of ransomware over the past few years, such as CryptoLocker, CryptoWall, TorrentLocker, TeslaCrypt, Locky, Petya, WannaCry, Bad Rabbit, and Samas. Each of these variations use new methods of infecting their victims’ computers, thereby compromising the data and network of many organizations worldwide.
    [Show full text]
  • Siber Güvenlik Ve Savunma STANDARTLAR Ve UYGULAMALAR
    Siber Güvenlik ve Savunma STANDARTLAR ve UYGULAMALAR Editör Prof. Dr. Şeref SAĞIROĞLU Yazarlar Prof. Dr. Şeref SAĞIROĞLU - Onur AKTAŞ A. Oğuzhan ALKAN - Bilgehan ARSLAN Dr. Öğr. Üyesi Atila BOSTAN - Dr. Öğr. Üyesi Eyüp Burak CEYHAN Dr. Öğr. Üyesi İsmail Fatih CEYHAN Dr. Öğr. Üyesi Onur ÇAKIRGÖZ Dr. Öğr. Üyesi Mehmet DEMİRCİ - Sedef DEMİRCİ Doç. Dr. Gülüstan DOĞAN Dr. Öğr. Üyesi Muharrem Tuncay GENÇOĞLU Doç. Dr. Ali Hakan IŞIK - Burak ÖZÇAKMAK Dr. Öğr. Üyesi A. Nurdan SARAN - Doç. Dr. Gökhan ŞENGÜL Seda YILMAZ - Özgür YÜREKTEN Ankara 2019 Siber Güvenlik ve Savunma: Standartlar ve Uygulamalar Editör Prof. Dr. Şeref SAĞIROĞLU Yazarlar Prof. Dr. Şeref SAĞIROĞLU Doç. Dr. Gökhan ŞENGÜL Doç. Dr. Ali Hakan IŞIK Doç. Dr. Gülüstan DOĞAN Dr. Öğr. Üyesi Atila BOSTAN Dr. Öğr. Üyesi Eyüp Burak CEYHAN Dr. Öğr. Üyesi İsmail Fatih CEYHAN Dr. Öğr. Üyesi Onur ÇAKIRGÖZ Dr. Öğr. Üyesi Mehmet DEMİRCİ Dr. Öğr. Üyesi Muharrem Tuncay GENÇOĞLU Dr. Öğr. Üyesi A. Nurdan SARAN Onur AKTAŞ A. Oğuzhan ALKAN Bilgehan ARSLAN Sedef DEMİRCİ Burak ÖZÇAKMAK Seda YILMAZ Özgür YÜREKTEN ISBN: 978-605-2233-42-9 1. Baskı Aralık, 2019 / Ankara 1500 Adet Yayınları Yayın No: 334 Web: grafikeryayin.com Kapak, Sayfa Tasarımı, Baskı ve Cilt Grafik-Ofset Matbaacılık Reklamcılık San. ve Tic. Ltd. Şti. 1. Cadde 1396. Sokak No: 6 06520 (Oğuzlar Mahallesi) Balgat-ANKARA Tel : 0 312. 284 16 39 Pbx - Faks : 0 312. 284 37 27 E-posta : [email protected] Web : grafiker.com.tr Bu kitap HAVELSAN'ın katkılarıyla basılmıştır. İÇİNDEKİLER EDİTÖRDEN ........................................................................................................................................................... 11 BİLGİ GÜVENLİĞİ DERNEĞİ'NDEN ............................................................................. 15 ÖN SÖZ ........................................................................................................................................................................... 19 1. BÖLÜM SİBER GÜVENLİK MATEMATİĞİ 1.1.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Detecting Malware in TLS Traffic
    IMPERIAL COLLEGE LONDON DEPARTMENT OF COMPUTING Detecting Malware in TLS Traffic Project Report Supervisor: Author: Sergio Maffeis Olivier Roques Co-Supervisor: Marco Cova Submitted in partial fulfillment of the requirements for the MSc degree in Computing Science / Security and Reliability of Imperial College London September 2019 Abstract The use of encryption on the Internet has spread rapidly these last years, a trend encouraged by the growing concerns about online privacy. TLS (Transport Layer Security), the standard protocol for packet encryption, is now implemented by every major websites to protect users’ messages, transactions and credentials. However cybercriminals have started to incorporate TLS into their activities. An increasing number of malware leverage TLS encryption to hide their communications and to exfiltrate data to their command server, effectively bypassing traditional detection platforms. The goal of this project is to design and implement an effective alternative to the unpractical method of decrypting TLS packets’ payload before looking for signs of malware activity. This work presents a highly accurate supervised classifier that can detect malicious TLS flows in a company’s network traffic based on a set of features related to TLS, certificates and flow metadata. The classifier was trained on curated datasets of benign and malware observations, which were extracted from capture files thanks to a set of tools specially developed for this purpose. We detail in this report the complete development process, from data collection and feature extraction to model selection and performance analysis. ii Acknowledgments I would like to particularly thank Marco Cova and Sergio Maffeis, my project su- pervisors, for their valuable and continuous suggestions and for their constructive feedbacks on this project.
    [Show full text]
  • Ransomware and Cyber Risk Management
    Ransomware and Cyber Risk Management By Randy Werner Ransomware and cyber extortion represent one of the more malicious types of hacker attacks making the rounds today. It sneaks into computer systems, encrypts files, and demands a ransom before decrypting the files. A major problem is that ransomware does not always decrypt files even after the ransom is paid. Being prepared and taking precautions against cyber risk exposures such as ransomware is therefore essential. Otherwise, if not prepared, you are at the mercy of criminals who prey on unprepared and unsuspecting businesses and individuals. Ransom demands range from a few hundred dollars to several thousand, depending on the size of the victim. Not all ransomware attacks are reported to authorities, so estimates of the total amount paid over the past few years vary widely, ranging up to $300 million. The more notorious names among ransomware are CryptoLocker, CryptoWall, TorrentLocker and Locky, among others. Some attacks rely on software that now has known fixes, so a solution might be found online. However, other ransomware is technically advanced and has no known fix, except for the victim to rely on current backup files. The primary defense is to institute frequent backups of the files you do not want to lose. Some ransomware even seeks out backup copies of files, so best practices include creating multiple backups in different locations. Cloud services, or remote backup services, and external or USB hard drives are options to consider for multiple backups. Even with backup files in place, a firm may still spend many hours gathering, re-entering and reconstructing data.
    [Show full text]
  • English for It Students
    УКРАЇНА НАЦІОНАЛЬНИЙ УНІВЕРСИТЕТ БІОРЕСУРСІВ І ПРИРОДОКОРИСТУВАННЯ УКРАЇНИ Кафедра англійської філології Ямнич Н. Ю., Данькевич Л. Р. ENGLISH FOR IT STUDENTS 1 УДК: 811.111(072) Навчальний посібник з англійської мови розрахований на студентів вищих навчальних закладів зі спеціальностей «Комп”ютерні науки» та «Програмна інженерія». Мета видання – сприяти розвитку і вдосконаленню у студентів комунікативних навичок з фаху, навичок читання та письма і закріплення навичок з граматики, а також активізувати навички автономного навчання. Посібник охоплює теми актуальні у сучасному інформаційному середовищі, що подаються на основі автентичних професійно спрямованих текстів, метою яких є розвиток у студентів мовленнєвої фахової компетенції, що сприятиме розвитку логічного мислення. Добір навчального матеріалу відповідає вимогам навчальної програми з англійської мови. Укладачі: Л.Р. Данькевич, Н.Ю. Ямнич, Рецензенти: В. В. Коломійцева, к. філол. н., доцент кафедри сучасної української мови інституту філології Київського національного університету імені Тараса Шевченка В.І. Ковальчук, д. пед. наук, професор,завідувач кафедри методики навчання та управління навчальними закладами НУБіП України Кравченко Н. К., д. філ. наук, професор кафедри англійської філології і філософії мови ім. професора О. М. Мороховського, КНЛУ Навчальний посібник з англійської мови для студентів факультету інформаційних технологій. – К.: «Компринт», 2017. – 608 с. ISBN Видання здійснено за авторським редагуванням Відповідальний за випуск: Н.Ю.Ямнич ISBN © Н. Ю. Ямнич, Л.Д. Данькевич, 2017 2 CONTENTS Unit 1 Higher Education 5 Language practice. Overview of verb tenses 18 Unit 2 Jobs and careers 25 Language practice. Basic sentence structures 89 Unit 3 Tied to technology 103 Language practice. Modal verbs 115 Unit 4 Computers 135 Language practice. Passive 153 Unit 5 Communication. E –commerce 167 Language practice.
    [Show full text]
  • D6.2 Altcoins – Alternatives to Bitcoin and Their Increasing Presence In
    Ref. Ares(2018)1599225 - 22/03/2018 RAMSES Internet Forensic platform for tracking the money flow of financially-motivated malware H2020 - 700326 D6.2 Altcoins: Alternatives to Bitcoin and their increasing presence in Malware-related Cybercrime Lead Authors: Darren Hurley-Smith (UNIKENT), Julio Hernandez-Castro (UNIKENT) With contributions from: Edward Cartwright (UNIKENT), Anna Stepanova (UNIKENT) Reviewers: Luis Javier Garcia Villalba (UCM) Deliverable nature: Report (R) Dissemination level: Public (PU) (Confidentiality) Contractual delivery date: 31/08/2017 Actual delivery date: 31/08/2017 Version: 1.0 Total number of pages: 36 Keywords: Cryptocurrency, altcoin, malware, darknet market, privacy Abstract Bitcoin is a relatively well-known cryptocurrency, a digital token representing value. It uses a blockchain, a distributed ledger formed of blocks which represent a network of computers agreeing that transactions have occurred, to provide a ledger of sorts. This technology is not unique to Bitcoin, many so-called ‘altcoins’ now exist. These alternative coins provide their own services, be it as a store of value with improved transactions (lower fees, higher speed), or additional privacy. Malware and Dark Net Market (DNM) operators have used Bitcoin to facilitate pseudo-anonymous extraction of value from their victims and customers. However, several high-profile arrests have been made using Bitcoin transaction graphing methods, proving that the emphasis is on the pseudo part of pseudo-anonymity. Altcoins specialising in masking the users’ identity – Monero, ZCash, and Dash – are therefore of interest as the next potential coins of choice for criminals. Ethereum, being the second largest crypto-currencies and imminently implementing its own privacy features, is also of interest.
    [Show full text]
  • Ransomware Payments in the Bitcoin Ecosystem
    Ransomware Payments in the Bitcoin Ecosystem Masarah Paquet-Clouston Bernhard Haslhofer Benoît Dupont GoSecure Research Austrian Institute of Technology Université de Montréal Montreal, Canada Vienna, Austria Montreal, Canada [email protected] [email protected] [email protected] ABSTRACT the time of writing, there are 5051 known ransomware families de- Ransomware can prevent a user from accessing a device and its tected and almost all of them demand payments in Bitcoin [27], files until a ransom is paid to the attacker, most frequently in Bit- which is the most prominent cryptocurrency. coin. With over 500 known ransomware families, it has become Yet, global and reliable statistics on the impact of cybercrime in one of the dominant cybercrime threats for law enforcement, se- general, and ransomware in particular, are missing, causing a large curity professionals and the public. However, a more comprehen- misunderstanding regarding the severity of the threat and the ex- sive, evidence-based picture on the global direct financial impact tent to which it fuels a large illicit business. Most of the statistics of ransomware attacks is still missing. In this paper, we present available on cybercrime and ransomware are produced by private a data-driven method for identifying and gathering information corporations (cf. [29, 38, 39]) that do not disclose their underlying on Bitcoin transactions related to illicit activity based on foot- methodologies and have incentives to over- or underreport them prints left on the public Bitcoin blockchain. We implement this since they sell cybersecurity products and services that are sup- method on-top-of the GraphSense open-source platform and ap- posed to protect their users against such threats [23].
    [Show full text]
  • Manual De Buenas Practicas De Seguridad Informática En Redes Domesticas
    MANUAL DE BUENAS PRACTICAS DE SEGURIDAD INFORMÁTICA EN REDES DOMESTICAS DIDIER FERNANDO HURTADO VALERO UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA - UNAD ESCUELA DE CIENCIAS BÁSICAS, TECNOLOGÍA E INGENIERÍA - ECBTI. ESPECIALIZACIÓN EN SEGURIDAD INFORMÁTICA BOGOTÁ 2021 MANUAL DE BUENAS PRACTICAS DE SEGURIDAD INFORMÁTICA EN REDES DOMESTICAS DIDIER FERNANDO HURTADO VALERO Proyecto de Grado - Monografía presentada para optar por el título de ESPECIALISTA EN SEGURIDAD INFORMÁTICA Asesor: Miguel Andrés Ávila Gualdrón Magister en Ciberdefensa UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA - UNAD ESCUELA DE CIENCIA BÁSICAS, TECNOLOGÍA E INGENIERÍA - ECBTI ESPECIALIZACIÓN EN SEGURIDAD INFORMÁTICA BOGOTÁ 2021 NOTA DE ACEPTACIÓN _________________________ Firma del presidente del Jurado _________________________ Firma del jurado _________________________ Firma del jurado Bogotá, Fecha de sustentación DEDICATORIA A Dios, que me regala esta experiencia de vida, a mi amada hija que ha sido el motor que mueve esta etapa de mi vida, a mis padres que han sido el fuerte soporte del esfuerzo, sacrificio y trabajo que representa este trabajo y a todos quienes han hecho parte de esta experiencia. AGRADECIMIENTOS Con el más grande y sincero sentimiento de agradecimiento a Dios y a mi familia quienes hacen posible la realización de este trabajo, adicionalmente a la Universidad Nacional Abierta y a Distancia UNAD por brindarme la mediación y el conocimiento para la realización como especialista. CONTENIDO INTRODUCCIÓN ..................................................................................................
    [Show full text]