Practical Security Guide to Prevent Cyber Extortion

Similar documents
The Hotel Hijackers. The Hotel Hijackers 1

Anti-exploit tools: The next wave of enterprise security

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

PANDALABS REPORT Q January - March 2015

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Trust the Innovator to Simplify Cloud Security

Practical guide for secure Christmas shopping. Navid

COULD YOUR BUSINESS SURVIVE A CRYPTOR? Learn how to guard against crypto-ransomware. #SecureBiz

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Internet threats: steps to security for your small business

Beware! CryptoLocker Ransomware

Practical tips for a. Safe Christmas

Data Security Best Practices. White Paper

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Agnitum SMB Solutions. Outpost Network Security Version 3.2 Securing your network

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE. Part I: Reducing Employee and Application Risks

User Documentation Web Traffic Security. University of Stavanger

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT -BASED THREATS

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Almost 400 million people 1 fall victim to cybercrime every year.

Information Security for the Rest of Us

Identity and Access Management in the Commonwealth

Computer Viruses: How to Avoid Infection

Are You A Sitting Duck?

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

Internet basics 2.3 Protecting your computer

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Presented by: Islanders Bank

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

NATIONAL CYBER SECURITY AWARENESS MONTH

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Kaspersky Internet Security 2014: Reviewer s Guide

2012 NORTON CYBERCRIME REPORT

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Phishing Activity Trends Report. 1 st Half Committed to Wiping Out Internet Scams and Fraud

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Zscaler Cloud Web Gateway Test

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Building a Business Case:

Unknown threats in Sweden. Study publication August 27, 2014

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

STOP Cybercriminals and. security attacks ControlNow TM Whitepaper

White Paper - Crypto Virus. A guide to protecting your IT

Kaspersky Security Network

Cyber Crime: You Are the Target

HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success

Online Cash Manager Security Guide

Summary of the State of Security

GlobalSign Malware Monitoring

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Security A to Z the most important terms

CYBER SECURITY THREAT REPORT Q1

Desktop and Laptop Security Policy

BE SAFE ONLINE: Lesson Plan

A Case for Managed Security

Common Cyber Threats. Common cyber threats include:

What Do You Mean My Cloud Data Isn t Secure?

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Endpoint Security Management

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Advanced Persistent Threats

Statistical Analysis of Internet Security Threats. Daniel G. James

10 Quick Tips to Mobile Security

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Don t Fall Victim to Cybercrime:

Users Beware: 10 Security Tips to Share with Your Users

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

Open an attachment and bring down your network?

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Keeping you and your computer safe in the digital world.

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Closing the Antivirus Protection Gap

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Presentation Objectives

2012 Bit9 Cyber Security Research Report

Secure Your Mobile Workplace

How To Prevent Cybercrime

Remote Deposit Quick Start Guide

Evaluating DMARC Effectiveness for the Financial Services Industry

Fighting Advanced Threats

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Endpoint Security and the Case For Automated Sandboxing

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

INDUSTRY OVERVIEW: FINANCIAL

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Transcription:

Practical Security Guide to Prevent Cyber Extortion

European organizations are the ones that suffer the highest number of sensitive data theft. The outlook for 2016 is that Europe will continue to be at risk of cyberattacks. 91% of SMEs have been targets of IT attacks Source: Shopper Software Security in SMBs. Nielsen, April 2015 2

Ignoring malware attacks is a risk not worth taking. Panda presents you with advice to keep your company safe and your mind at ease.

What is Cyber Extortion? 4

Cyber extortion is a form of blackmail in which victims of an IT attack are forced to pay to avoid its effects. 39% Unsafe and fraudulent websites One of the most widespread methods of cyber extortion is ransomware. This attack encrypts the victim s information and then demands a ransom in order for the information to be decrypted and returned. Once involved in the blackmail, having paid the ransom demanded by the cybercriminal, the victim of a cyber extortion usually receives an email with the code to decrypt their information. The method of payment is usually Bitcoin, a digital currency that can be exchanged for real money (1 Bitcoin = $380). In fact, they usually use this payment method to hamper its traceability. However, the payment doesn t guarantee that the business won t be attacked again in the future. Other similar attacks that use this kind of extortion are ones which infect your computer and access its webcam, then blackmail you so that they do not spread the videos. 23% Software download 19% Malware received by email The majority of attacks start with emails that include attached documents or by visiting unsecure websites. Sources of Infection Source: Shopper Software Security in SMBs. Nielsen, April 2015 5

How do cybercriminals use ransomware for attacks? 6

Ransomware such as Cryptolocker, Cyptowall, or Coinvault threaten the integrity of files that are found on the computer or network drives that they have access to. The malware encrypts the data so that it can only be decrypted using a key that the cybercriminals will hand over if the business pays the requested ransom. If you are one of the companies affected by ransomware then you usually have between 48 and 72 hours to pay the ransom. If you don t pay during this timeframe then the cost of decrypting your data could increase. If they offer you an extension but the payment hasn t been completed, it s possible that they will delete the decryption key, making it impossible to recover the company s files. Even if the payment is carried out, there is no guarantee that your data will be returned. This is because it is possible that the software developed by the cybercriminals contains bugs that cause a corruption in the decryption process, or law enforcement agencies are constantly trying to interrupt the cybercriminals infrastructure. 7

What to do if you are a victim of cyber extortion? 8

Don t give in to the cybercriminals blackmail. Completely wipe all traces of malware from your computers. Recover all your encrypted files. There is no guarantee that this will solve the problem. In fact, in many cases, the victim of the blackmailing has given over the amount demanded but without receiving the decryption key (or even a corrupted key). None of these outcomes can help get the kidnapped information back. Repeated blackmailing is also common. Once the information is returned, the cybercriminals install processes which continue to encrypt the company s data in no time. On other occasions, the cybercriminal negotiates a higher amount than originally demanded, depending on the perceived desperation of the victim or the company s financial situation. To do this, Panda recommends using Cloud Cleaner in offline mode, a solution that specializes in removing all traces of advanced viruses from affected computers. To do this it is necessary to have previously activated the File History (in Windows 8.1 and 10) or System Protection (Windows 7 and Vista), which will allow for changes made by the malware on data files to be reversed. It is also recommended that you make security copies of critical files every so often. Should you have a recent backup of your important documents we advise scanning these for any remnants of malware before restoring them. 9

It must be kept in mind that this type of threat has become extremely popular. In fact, ransomware is a billion-dollar industry. One estimate showed that a single strain of ransomware, Cryptowall 3.0, made over $325 million from US victims in 2015 alone. Besides, the increased number of mutations, coupled with new strains of ransomware that are constantly appearing, makes it difficult for traditional antiviruses that are based on signature files to detect them. This is why it is fundamental to have an advanced security solution that detects and protects your computers from direct attacks, Zero-Days, and new versions of Ransomware.

What does a malware consist of and what are the most common types? Well, it is any type of malicious program or IT code whose objective is to infiltrate networks and computers to cause damage, spy, and steal information. The most dangerous types of malware are: RANSOMWARE It blocks the PC, removing all user control, encrypts files and demands a financial ransom to return them. EXPLOIT It takes advantage of a security fault or vulnerability in the communication protocols to enter your computer. SPYWARE It collects names, access details, passwords, and any type of information about your company. TROJAN It installs various applications so that hackers can control the computer. They control your files and steal your confidential information. APT (ADVANCED PERSISTENT THREAT) It s a computer process that penetrates your security to control and monitor it, being able to continually extract information for business or political means. SCAM It tricks you with false promotions such as holidays or lotteries, then asks you for money to access the prize. BACKDOOR It opens a back door to take control of your system. KEYLOGGER It collects and sends all keystrokes completed by the user. BOT It is a program that remotely controls your PC. PHISHING It creates a false URL to obtain your data and steal your identity, with the aim of stealing from your bank accounts. WORM It infects all of your computers, slowing down the network and even blocking access to communications. 11

Evolution of malware, complexity and sophistication. Can these antiviruses stop advanced threats? The technology used by traditional antiviruses (signature files, heuristic) are reactive. 18% of new malware isn t detected by traditional antiviruses in the first 24 hours, and 2% is still undetected 3 months later. No antivirus can do this. In fact, There are websites online that allow you to see if a certain malware will be detected by an antivirus. Hackers then launch their malicious code once they have verified that it won t be detected by any antivirus. 24 hours 3 days 7 days 1 month 3 months 18 % 9 % 7 % 4 % 2 % 70 % 80 % 90 % 100 % % Non-detected viruses 12

Panda Security s 5 Recommendations to prevent Cyberattacks 13

Make your users aware Make sure that your users know the risks of phishing and that they don t download unknown applications - or ones not provided by the company - and to avoid untrusted websites. Develop internal protocols Establish protocols and security measures to control the installation and execution of any software. You should also check the inventory of your applications frequently. Be aware on the Internet Set out policies for surfing the Internet that controls the reputation of websites that can be accessed. A solution that fit your needs Keep your systems & applications updated Determine a policy for updating your applications and for blocking or eliminating them if they aren t needed by the company. It is very important to get protected from applications that, even they are trustworthy (such us Java, Office, Chrome, Mozilla or Adobe), they can have some vulnerabilities or security holes that can be exploited by cybercriminals. Ensure that you have the security solution that your company needs and keep it updated. A solution with different security layers that should be able to detect and block advanced threats. 14

15 Image: The toolbars present a big security risk.

How can you really protect your company? 16

Panda Security has developed the first solution that guarantees continuous monitoring of 100% of the active processes. Panda Security has developed the only cybersecurity solution that is capable of protecting your company against direct attacks, Zero-Days, or any type of advanced threat, including Cryptolocker. It is the first product on the market that guarantees to completely protect computers and servers, thanks to continuously monitoring 100% of the processes on the endpoint. 17

Adaptive Defense 360 offers the greatest security levels available, far ahead of any other antivirus on the market. Traditional Antiviruses They only recognize malware but nothing else. Work flow Risk Adaptive Defense 360 monitors, registers, and classifies 100% of the running applications which, combined with EDR features, allows us to detect and block the malware that other protection systems don t even see. As they can t classify anything suspicious, these attacks represent a huge security problem for the traditional antivirus (especially targeted and zero-day attacks). Adaptive Defense 360 It monitors absolutely all the active processes. Managed Service Objective: 0 Risk Adaptive Defense 360 knows with certainty if a process is good or bad, it classifies absolutely everything so that there is no suspicion. 18

Being able to control absolutely everything that happens on your computers allows you to: Detect information leaks, both from malware and employees and from any archive that contains data (pdf, word, excel, txt,...). Discover and solve vulnerabilities on your systems and applications, and prevent the use of unwanted programs. Detect direct attacks aimed at your systems. 19

Limitless Visibilty, Absolute Control It detects and blocks the malware that other systems miss. Monitors, records and classifies 100% of running applications. 20

Adaptive Defense 360 in numbers It protects more than 500,000 endpoints 500K and servers worldwide. 1.5M It has categorized more than 1.5 million applications. It has mitigated more than 1,100,000 security breaches in the last year alone. 1.1M 550K It has saved more than 550,000 hours in IT resources, which amounts to an estimated saving of 34.8 million. It has detected malware in 100% of the 100 % environments it has been installed in, independently of the existing protection mechanisms. Data from 2015. What s more, it comes with Panda Security s 25 years of experience, which makes us a pioneer in malware detection and in implementing innovative security solutions. Not to mention that more than 30 million endpoints are currently protected by Panda worldwide. 21

Contact us for more information BENELUX +32 15 45 12 80 belgium@pandasecurity.com HUNGARY +36 1 224 03 16 hungary@pandasecurity.com SPAIN +34 900 90 70 80 comercialpanda@pandasecurity.com BRAZIL +55 11 3054-1722 brazil@pandasecurity.com ITALY +39 02 24 20 22 08 italy@pandasecurity.com SWEDEN (FINLAND & DENMARK) +46 0850 553 200 sweden@pandasecurity.com FRANCE +33 (0) 1 46842 000 commercial@fr.pandasecurity.com MEXICO +52 55 8000 2381 mexico@pandasecurity.com SWITZERLAND +41 22 994 89 40 info@ch.pandasecurity.com GERMANY (AND AUSTRIA) +49 (0) 2065 961-0 sales@de.pandasecurity.com NORWAY +47 93 409 300 norway@pandasecurity.com UNITED KINGDOM +44 (0) 844 335 3791 sales@uk.pandasecurity.com GREECE +30 211 18 09 000 greece@pandasecurity.com PORTUGAL +351 210 414 400 geral@pt.pandasecurity.com USA (AND CANADA) +1 877 263 3881 sales@us.pandasecurity.com