Главная
Study mode:
on
1
Introduction
2
Introductions
3
What is ransomware
4
Types of ransomware
5
Ransomware in general
6
Ransomware is not new
7
New ways to leverage ransomware
8
Difference between symmetric and asymmetric
9
Ransomware is a growing threat
10
Ransomware is a marketing threat
11
CryptoLocker appears
12
Theyre getting the data back
13
How we met
14
Working group
15
David Diggin
16
Mafia Rules
17
ASDF
18
OPSEC
19
Recovery
20
Backups
21
Updated Directory
22
Domain Generation
23
Reverse DGA
24
No Domains Registered
25
Community Response
26
Working Groups
27
Industry Law Enforcement
28
FBI
29
CryptoLocker
30
Gameover Zeus
31
Single Flux Networking
32
Following the Money
33
Targeted Businesses
34
Money Packs
35
The good goes takedown
36
DNS tools
37
Passive DNS
38
Bias
39
Bitcoin Value
40
Politeness
41
sufficiency
42
we are sending a message
43
a lot more events
44
there comes a time
45
theres nothing wrong with that
46
this was a very lucrative cash crop
47
what do you do next
48
they tended to do trouble
49
Flashback
50
Algorithm
51
sinkholes
52
no physical evidence
53
law enforcement
54
impact
55
working with industry
56
ransomware examples
57
ransomware techniques
58
resiliency
Description:
Explore the evolving threat of ransomware in this Black Hat conference talk. Delve into the emergence of CryptoLocker, the first ransomware to implement encryption correctly, and its impact on security research and countermeasures. Learn about the threat intelligence community's response, including the development of near-real-time infrastructure tracking. Examine various ransomware campaigns, their techniques, and the collaborative efforts between industry and law enforcement to combat this growing threat. Gain insights into the differences between symmetric and asymmetric encryption, domain generation algorithms, and Bitcoin's role in ransomware operations. Discover the importance of backups, community response, and working groups in addressing ransomware challenges. Analyze the impact of ransomware on businesses and individuals, and explore strategies for resilience and prevention against this lucrative cybercrime trend.

The New Scourge of Ransomware - A Study of CryptoLocker and Its Friends

Black Hat
Add to list
0:00 / 0:00