Learn about Onion ransomware, which uses The Onion Router (TOR) to conceal its existence and transfer data and payment information, making it hard to track the cybercriminals.
- [Instructor] Onion ransomware is also known as…trojan-ransom.win32.onion.…It's the successor to CrytoLocker…and is like most ransomware…in that it encrypts the data…and then uses a strict deadline to pay the ransom…to decrypt the data.…What's different about Onion ransomware…is the way it communicates…with a command and control server.…Onion ransomware uses The Onion Router or TOR…to conceal its existence and activities…such as transferring data and payment information…and this makes it hard to track the cyber criminals.…
The first malware to use TOR…was the banking Trojan Zeus in 2013.…Researchers have found that using TOR…is a reliable form of communication for cyber criminals…as it encrypts communication…and then bounces between relay nodes…to prevent eavesdroppers…from following the attacker's tracks.…As a result, TOR will most likely be used…by more forms of malware.…TOR is an open framework that encrypts traffic…and allows participants to move freely…without fear of identifying their location.…
Once in TOR, a path is chosen through the network.…
- How ransomware works
- Types of ransomware
- Safeguarding Windows
- Securing your router
- Updating software and operating systems
- Spam, phishing, and spoofing
- Reporting ransomware
Skill Level Beginner
Ransomware: Practical Reverse Engineeringwith Malcolm Shore1h 22m Intermediate
Malware: Defense and Responsewith Scott M Burrell40m 46s Intermediate
Windows Performance Toolkit: Malware Analysiswith Thomas Pantels1h 4m Intermediate
1. Ransomware Overview
2. Types of Ransomware
3. Safeguarding Windows
4. Good Practice
Next steps1m 25s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.