Ransomware is a modern form of malware. In this video, look at how ransomware works as a means of extorting money from individuals and organizations.
- [Instructor] Let's have a look at a particular … form of malware known as ransomware. … For targets with current backups, being hit with ransomware … is just a nuisance. … But for those without, it can be a very expensive lesson … in practical cyber security. … Instead of stealing information, ransomware encrypts … files or storage systems on its targets … to lock out their legitimate owner … and then demands payment for the decryption key. … Asymmetric encryption is typically used for this. … Let's look at a contemporary example of ransomware. … CryptoLocker emerged in 2013 and was the most prevalent … variant of ransomware until mid 2014 … when new variants such as TorrentLocker … and Cryptowall took over. … CryptoLocker was extraordinarily successful … with an estimaated 234,000 victims. … It used phishing campaigns to opportunistically … target its victims. … These campaigns included the FedEx and UPS … you-have-a-parcel email which includes a hyperlink … to a malicious Website where the malware exists. …
Author
Released
2/13/2020- Dissecting cyber risk
- Working with NIST, COBIT, and other frameworks
- Exploring cybercrime
- The different stages of the cyber kill chain
- How cyber criminals hide their attacks
- Measuring incident management maturity
- Detecting and responding to attacks
Skill Level Intermediate
Duration
Views
Related Courses
-
Learning Security Frameworks
with Mandy Huth47m 8s Intermediate -
Security Matters (To Everyone)
with Mandy Huth33m 8s Beginner -
GDPR Compliance: Essential Training
with Mandy Huth55m 17s Intermediate -
Penetration Testing Essential Training
with Malcolm Shore2h 29m Intermediate
-
Introduction
-
1. Frameworks and Controls
-
An advanced risk framework5m 22s
-
Managing security with COBIT3m 15s
-
ASD and its top controls2m 49s
-
Protecting payment card data7m 14s
-
Clouding the issues3m 44s
-
2. Cyber Threats
-
Hiding using processes3m 59s
-
3. Managing Cyber Incidents
-
Incident management basics3m 48s
-
Detecting an attack4m 4s
-
Responding to an incident2m 33s
-
-
Conclusion
-
What's next55s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Ransomware: A modern form of extortion