I INF 453 Lecture Notes - Lecture 4: Untraceable, Microsoft Excel, Botnet

52 views3 pages
Ransomware
ā€¢Traī„ed ī„aī„k to ī­īµī“īµ-AIDS Trojan
o Infection vector -5 Ā¼ floppy
ā€¢Trojaī…¶.Gpī„oder
o First true Ransomware
o 2005
ā€¢Outī…¶uī…µī„er data ī„reaī„hes ī³ī²īµī° to ī²ī¬ī­īÆ
ā€¢Direī„t reī‡€eī…¶ue geī…¶eratioī…¶
ā€¢Aī‡€erage raī…¶soī…µ: $īÆī¬ī¬iī…¶ Bitī„oiī…¶s
Social Engineering
Definition:
īžā€¦psī‡‡ī„hologiī„al ī…µaī…¶ipulatioī…¶ of people iī…¶to perforī…µiī…¶g aī„tioī…¶s or diī‡€ulgiī…¶g ī„oī…¶fideī…¶tial iī…¶forī…µatioī…¶. A
type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from
a traditional "con" in that it is often one of ī…µaī…¶ī‡‡ steps iī…¶ a ī…µore ī„oī…µpleī‡† fraud sī„heī…µe.īŸ
ā€¢Itā€™s a Coī…¶ ā€“short for īžī„oī…¶fideī…¶ī„eīŸ
ā€¢Triī„k the īžī…µarkīŸ iī…¶to doiī…¶g ī‡hat the ī„oī…¶ artist ī‡aī…¶ts
ā€¢Part of ī„oī…µpleī‡† sī„aī…µ
ā€¢Loī‡ teī„h ī‡€ersioī…¶ has ī„eeī…¶ arouī…¶d foreī‡€er:
o the Devil in the bible
o Victor Lustigā€“īžsoldīŸ the Eiffel Tower to scrpdealers
o Selling the Brooklyn bridge
Ransomware
Definition:
ā€¢Itā€™s a Haī„k
o Uses normally useful utilities -file encryption
o Holds data hostage
ā€¢Most are siī…µilar to ā€œā€œL/TLā€œ
o Asymmetric (Public key/Private Key) to encrypt the symmetric (shared key)
ā€¢Tiī…µe liī…µit -countdown
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Infection vector -5 floppy: troja(cid:374). gp(cid:272)oder, first true ransomware, 2005, out(cid:374)u(cid:373)(cid:271)er data (cid:271)rea(cid:272)hes (cid:1011)(cid:1010)(cid:1013)(cid:1008) to (cid:1010)(cid:1004)(cid:1005)(cid:1007, dire(cid:272)t re(cid:448)e(cid:374)ue ge(cid:374)eratio(cid:374, a(cid:448)erage ra(cid:374)so(cid:373): (cid:1004)(cid:1004)i(cid:374) bit(cid:272)oi(cid:374)s. Social engineering (cid:862) ps(cid:455)(cid:272)hologi(cid:272)al (cid:373)a(cid:374)ipulatio(cid:374) of people i(cid:374)to perfor(cid:373)i(cid:374)g a(cid:272)tio(cid:374)s or di(cid:448)ulgi(cid:374)g (cid:272)o(cid:374)fide(cid:374)tial i(cid:374)for(cid:373)atio(cid:374). Ransomware: uses normally useful utilities -file encryption, holds data hostage, most are si(cid:373)ilar to l/tl , asymmetric (public key/private key) to encrypt the symmetric (shared key, ti(cid:373)e li(cid:373)it -countdown, bit(cid:272)oi(cid:374): u(cid:374)tra(cid:272)ea(cid:271)le, pa(cid:455) a(cid:374)d get the pri(cid:448)ate ke(cid:455) Infected downloads: pop-ups/ads, previous compromise, e(cid:374)(cid:272)r(cid:455)ptio(cid:374) soft(cid:449)are, pa(cid:455)(cid:373)e(cid:374)t s(cid:455)ste(cid:373) web based, (cid:862)custo(cid:373)er(cid:863) support they want people to pay, de(cid:272)r(cid:455)ptio(cid:374) soft(cid:449)are. Ransomware evolution: fake av social engineering to get user cc info and download malware, lo(cid:272)ker straight up pay to get access to the computer returned, cr(cid:455)pto pay to unlock your files, ke(cid:455) storage lessons, registry. In malware: common keys, e(cid:374)(cid:272)r(cid:455)ptio(cid:374) algorith(cid:373)s move to industry standards, rsa, aes, etc.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers