SlideShare a Scribd company logo
Ransomware
“Cyber criminals are not just malicious...They’re business-
oriented and seek to cash out on their efforts.
That’s why, after testing ransomware on home users and
evaluating the impact, they moved onto bigger targets:
police departments, city councils and even schools and,
worse, hospitals!”
heimdalsecurity.com
Because public institutions, manage huge databases of personal and
confidential information that cyber criminals can sell
Because these institutions ofttimes lack cyber defenses that can protect them
against ransomware
Because the staff is not trained to spot cyber attacks (ransomware often
leverages the human factor weakness to trigger the infection)
Because public institutions often use outdated software and equipment, which
means that their computer systems are packed with security holes just
begging to be exploited
Because ransomware has a big impact on conducting usual activities, causing
huge disruptions
heimdalsecurity.com
Why do ransomware creators and distributors target public institutions?
Victims are hacked by clicking on an innocuous looking attachment or website link within an email. This
releases malicious software that disables the victim’s computer system and computers on the same
network.
Ransom notes then appear across the network demanding money paid in Bitcoin in return for a decryption
key that will disable the virus. There is no guarantee that the key will work or prevent further attacks.
St Louis Public Library Computers Inoperable
ST. LOUIS, MO (KTVI) – All computers at St. Louis
Public Library locations are inoperable. The library says
that they have been hacked and over 700 computers at
16 branches computers are being held for ransom.
"It's been a very sophisticated attack on our system,"
library executive director Waller McGuire said. "The
library is not going to pay a ransom to open up its
computers, so we didn't go that far."
According to the library, hackers demanded $35,000 in the electronic currency Bitcoin -- but the
library refuses to pay. Instead, it'll wipe the entire computer system and reset it, which could take
days or weeks. The entire checkout system is on hold. No one can walk out with any of the
library's 4 million books, magazines and videos. And all computers are frozen.
Ransomware
“Trust No One. Literally”
1. Keep system and antivirus patched and updated. Utilize pop-up blockers.
2. Scrutinize links contained in e-mails and do not open attachments included in
unsolicited e-mails. Software should only be downloaded from trusted sites.
3. Back up data, make sure it is not accessible by computers. Some ransomware
has the capability to lock cloud-based backups when systems continuously
back up in real-time.
4. If you discover a rogue or unknown process on your machine, disconnect it
immediately from the internet or other network connections, and shut it down.
5. Scareware impersonates AV and can be ignored, Screenlockers lock a
machine up with a full screen message, but encrypting Ransomware “is the
truly nasty stuff”.

More Related Content

PPTX
NEKLS LAN Initiative
Northeast Kansas Library System
 
PPTX
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
National Information Standards Organization (NISO)
 
PPTX
Tsc2021 cyber-issues
Ernest Staats
 
PPTX
Smart Print Analytics
Paul O'Hagan
 
PPTX
HOW IOT IS AFFECTING MOBILE APPS DEVELOPMENT
Pushpraj Singh Verma
 
PDF
Internet of Things With Privacy in Mind
Gosia Fraser
 
PPTX
Information security trends and steps for (OSAC) Middle East divsion
Ernest Staats
 
PDF
Whois Accuracy Status and its Challenges
APNIC
 
NEKLS LAN Initiative
Northeast Kansas Library System
 
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
National Information Standards Organization (NISO)
 
Tsc2021 cyber-issues
Ernest Staats
 
Smart Print Analytics
Paul O'Hagan
 
HOW IOT IS AFFECTING MOBILE APPS DEVELOPMENT
Pushpraj Singh Verma
 
Internet of Things With Privacy in Mind
Gosia Fraser
 
Information security trends and steps for (OSAC) Middle East divsion
Ernest Staats
 
Whois Accuracy Status and its Challenges
APNIC
 

What's hot (20)

DOCX
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
DOCX
efficient io t management with resilience to unauthorized access to cloud sto...
Venkat Projects
 
DOCX
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
 
PPTX
Building a strong security strategy
Singtel
 
PDF
call for papers - International Journal on Cryptography and Information Secur...
JonesSmith7
 
PPTX
Mobile database security threats
Akhil Kumar
 
PDF
Ijcis -->cfp
JonesSmith7
 
DOCX
Ijisa
ijfcst journal
 
PPTX
Blockchain in cyber security
zaarahary
 
PPTX
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
ForgeRock
 
DOCX
Ijisa
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
PDF
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
IJORCS
 
DOCX
Ijisa
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
PPTX
ICT and Cybersecurity for Lawyers August 2021
Doug Newdick
 
PDF
Ijcet 06 07_002
IAEME Publication
 
PDF
SOC-as-a-Service - comSpark 2019
Advanced Technology Consulting (ATC)
 
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Manisha Luthra
 
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
efficient io t management with resilience to unauthorized access to cloud sto...
Venkat Projects
 
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
 
Building a strong security strategy
Singtel
 
call for papers - International Journal on Cryptography and Information Secur...
JonesSmith7
 
Mobile database security threats
Akhil Kumar
 
Ijcis -->cfp
JonesSmith7
 
Blockchain in cyber security
zaarahary
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
ForgeRock
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
IJORCS
 
ICT and Cybersecurity for Lawyers August 2021
Doug Newdick
 
Ijcet 06 07_002
IAEME Publication
 
SOC-as-a-Service - comSpark 2019
Advanced Technology Consulting (ATC)
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Manisha Luthra
 
Ad

Viewers also liked (6)

PPTX
Meraki Wi-Fi Statistics
Northeast Kansas Library System
 
PPTX
TSCPL: Library of the Year
Northeast Kansas Library System
 
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
PPTX
How to stay protected against ransomware
Sophos Benelux
 
PDF
Meraki Overview
Cloud Distribution
 
PDF
Ransomware - Information And Protection Guide - Executive Summary
Bright Technology
 
Meraki Wi-Fi Statistics
Northeast Kansas Library System
 
TSCPL: Library of the Year
Northeast Kansas Library System
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
How to stay protected against ransomware
Sophos Benelux
 
Meraki Overview
Cloud Distribution
 
Ransomware - Information And Protection Guide - Executive Summary
Bright Technology
 
Ad

Similar to Ransomware (20)

PDF
NCERT Ransomeware and malware attacks.pdf
AkashKumar1733
 
PPTX
Week 11- 2 computer misuse slides .pptx
hassanarif1022
 
PPSX
Security Awareness Training
William Mann
 
PPTX
Cybersecurity Training
WindstoneHealth
 
PDF
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
PPTX
Ransomeware and malware power point presentation
Parrie Vittiadarane
 
PPTX
Eset cybersecurity awareness (laxman giri)
लक्ष्मण गिरी
 
DOCX
Cyber crime
Salma Zafar
 
PDF
Ransomware hostage rescue manual
Roel Palmaers
 
PPTX
Cyber crime and cyber security
Keshab Nath
 
PPTX
Ransomware and email security ver - 1.3
Denise Bailey
 
PDF
Ransomware all locked up book
Diego Souza
 
PDF
cybercrime survival guide
Gary Gray, MCSE
 
PPTX
Defend Your Company Against Ransomware
Kevo Meehan
 
PPT
Cyber-Security.ppt
SeniorGaming
 
PPT
CS 1.ppt
JAYANTHKUMARTM
 
PPT
Cyber-Security-.ppt
karthikvcyber
 
PPTX
2nd Class PPT.pptx
SibyJames1
 
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
olisahchristopher
 
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
NCERT Ransomeware and malware attacks.pdf
AkashKumar1733
 
Week 11- 2 computer misuse slides .pptx
hassanarif1022
 
Security Awareness Training
William Mann
 
Cybersecurity Training
WindstoneHealth
 
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Ransomeware and malware power point presentation
Parrie Vittiadarane
 
Eset cybersecurity awareness (laxman giri)
लक्ष्मण गिरी
 
Cyber crime
Salma Zafar
 
Ransomware hostage rescue manual
Roel Palmaers
 
Cyber crime and cyber security
Keshab Nath
 
Ransomware and email security ver - 1.3
Denise Bailey
 
Ransomware all locked up book
Diego Souza
 
cybercrime survival guide
Gary Gray, MCSE
 
Defend Your Company Against Ransomware
Kevo Meehan
 
Cyber-Security.ppt
SeniorGaming
 
CS 1.ppt
JAYANTHKUMARTM
 
Cyber-Security-.ppt
karthikvcyber
 
2nd Class PPT.pptx
SibyJames1
 
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
olisahchristopher
 
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 

More from Northeast Kansas Library System (20)

PPTX
Disaster Asset Library.pptx
Northeast Kansas Library System
 
PPTX
Emergency Action Planning and Continuity of Operations KLA.pptx
Northeast Kansas Library System
 
PPTX
Census 2020 webinar
Northeast Kansas Library System
 
PDF
Designing The OPAC: A Rebrand
Northeast Kansas Library System
 
PPTX
Storyboarding for Better Design
Northeast Kansas Library System
 
PPTX
Anna foote super volunteers presentation
Northeast Kansas Library System
 
PPTX
Sarah thiel broaden your reach!!
Northeast Kansas Library System
 
PPTX
Tech Lab: Module 1
Northeast Kansas Library System
 
PDF
Telemedicine & Telehealth in KS
Northeast Kansas Library System
 
PPTX
Capturing Stories with Kaye McIntyre
Northeast Kansas Library System
 
PPTX
Libraries: 5 ways to maximize internet
Northeast Kansas Library System
 
PPTX
Advocacy with a big A
Northeast Kansas Library System
 
PPTX
Collecting statistics from the unifi wireless controller
Northeast Kansas Library System
 
PPTX
E rate Explained - 2015
Northeast Kansas Library System
 
PPTX
State Library of Kansas Statewide Resources Overview
Northeast Kansas Library System
 
PDF
Book Whisperers: Getting Kids Excited About Reading
Northeast Kansas Library System
 
PPTX
Measuring What Matters
Northeast Kansas Library System
 
PPT
Are You Doing This? (revised)
Northeast Kansas Library System
 
Disaster Asset Library.pptx
Northeast Kansas Library System
 
Emergency Action Planning and Continuity of Operations KLA.pptx
Northeast Kansas Library System
 
Census 2020 webinar
Northeast Kansas Library System
 
Designing The OPAC: A Rebrand
Northeast Kansas Library System
 
Storyboarding for Better Design
Northeast Kansas Library System
 
Anna foote super volunteers presentation
Northeast Kansas Library System
 
Sarah thiel broaden your reach!!
Northeast Kansas Library System
 
Telemedicine & Telehealth in KS
Northeast Kansas Library System
 
Capturing Stories with Kaye McIntyre
Northeast Kansas Library System
 
Libraries: 5 ways to maximize internet
Northeast Kansas Library System
 
Advocacy with a big A
Northeast Kansas Library System
 
Collecting statistics from the unifi wireless controller
Northeast Kansas Library System
 
E rate Explained - 2015
Northeast Kansas Library System
 
State Library of Kansas Statewide Resources Overview
Northeast Kansas Library System
 
Book Whisperers: Getting Kids Excited About Reading
Northeast Kansas Library System
 
Measuring What Matters
Northeast Kansas Library System
 
Are You Doing This? (revised)
Northeast Kansas Library System
 

Recently uploaded (20)

PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Software Development Methodologies in 2025
KodekX
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 

Ransomware

  • 2. “Cyber criminals are not just malicious...They’re business- oriented and seek to cash out on their efforts. That’s why, after testing ransomware on home users and evaluating the impact, they moved onto bigger targets: police departments, city councils and even schools and, worse, hospitals!” heimdalsecurity.com
  • 3. Because public institutions, manage huge databases of personal and confidential information that cyber criminals can sell Because these institutions ofttimes lack cyber defenses that can protect them against ransomware Because the staff is not trained to spot cyber attacks (ransomware often leverages the human factor weakness to trigger the infection) Because public institutions often use outdated software and equipment, which means that their computer systems are packed with security holes just begging to be exploited Because ransomware has a big impact on conducting usual activities, causing huge disruptions heimdalsecurity.com Why do ransomware creators and distributors target public institutions?
  • 4. Victims are hacked by clicking on an innocuous looking attachment or website link within an email. This releases malicious software that disables the victim’s computer system and computers on the same network. Ransom notes then appear across the network demanding money paid in Bitcoin in return for a decryption key that will disable the virus. There is no guarantee that the key will work or prevent further attacks.
  • 5. St Louis Public Library Computers Inoperable ST. LOUIS, MO (KTVI) – All computers at St. Louis Public Library locations are inoperable. The library says that they have been hacked and over 700 computers at 16 branches computers are being held for ransom. "It's been a very sophisticated attack on our system," library executive director Waller McGuire said. "The library is not going to pay a ransom to open up its computers, so we didn't go that far." According to the library, hackers demanded $35,000 in the electronic currency Bitcoin -- but the library refuses to pay. Instead, it'll wipe the entire computer system and reset it, which could take days or weeks. The entire checkout system is on hold. No one can walk out with any of the library's 4 million books, magazines and videos. And all computers are frozen.
  • 7. “Trust No One. Literally” 1. Keep system and antivirus patched and updated. Utilize pop-up blockers. 2. Scrutinize links contained in e-mails and do not open attachments included in unsolicited e-mails. Software should only be downloaded from trusted sites. 3. Back up data, make sure it is not accessible by computers. Some ransomware has the capability to lock cloud-based backups when systems continuously back up in real-time. 4. If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections, and shut it down. 5. Scareware impersonates AV and can be ignored, Screenlockers lock a machine up with a full screen message, but encrypting Ransomware “is the truly nasty stuff”.