Upload
fpa-technology-services-inc
View
49
Download
1
Tags:
Embed Size (px)
Citation preview
How CryptoLocker Still Haunts
an LA Wholesale Company
Courtesy of FPA Technology Services, Inc.
http://www.TechGuideforLADistributors.com
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
This ransomware and other
forms of extortion are on the
rampage in several forms
and are ready to pounce
on the unwary
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
The CryptoLocker Menace
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
The method of attack used
by the virus was as follows:
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
The virus entered a computer
running Microsoft Windows
by masquerading as an
innocuous email attachment
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Once the link in the email was
clicked, it then encrypted files
anywhere the user had access
to a shared drive
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
making the data in those files
inaccessible to their rightful
owner
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
The owner was threatened
with permanent loss of the data
unless a ransom was paid to
the hackers responsible for
the encryption operation
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
They had 3 days from the point
of infection until the unlock
code was permanently
deleted
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Cyber Extortion –
What Are Your Options?
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Opinions among experts
were divided in the beginning
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Some consultants albeit
unwillingly, said that paying
the ransom was the only way
to get the files back
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Others said that the ransom
should not be paid,
but did not suggest any
other constructive solution
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Over the past few years,
victims who have decided
to pay the ransom together
have paid out an estimated
$3 million to the hackers
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Those who tried to wait it out
while a solution was found
risked the permanent loss of
their files
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Prevention is Better than Cure
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Key protective measures to
start with in such situations are:
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
• Frequent, protected
backups of critical data
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
• Fully up-to-date network
security procedures and
tools
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
• The right level of information
security awareness
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Recently, INTERPOL and other
law enforcement agencies
and security organizations
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
were able to finally seize
the assets of the ransomware
culprits allowing victims to
unencrypt their files without
paying further ransoms
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
There is also no guarantee
of solutions being found for
similar viral infections in
the future
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
What Else is Lying in Wait?
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
CryptoLocker has already
inspired further malware
such as Cryptowall and
TorrentLocker
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Cyber extortion has also been
used against companies with
VoIP (Voice over IP) networks
as well
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Sound IT security procedures
are the only way to eliminate
or at least reduce their effects
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
How do you think an
enterprise should react
to a CryptoLocker or
similar extortion threat?
Sponsored by http://www.TechGuideforLADistributors.com
Craig PollackFounder & CEO
Give us your opinions on
the best way for business
to combat such menaces
in the Comments box below
Copyright © FPA Technology Services, Inc.
Learn How to Boost Your Company’s
Productivity with the Right Technology
Download Your Free Guide
How COOs at Los Angeles Distributors
and Manufacturers Get More Done
Now at http://www.TechGuideforLADistributors.com