0% found this document useful (0 votes)
145 views20 pages

Clop Ransomware

The document discusses various types of cyber threats including ransomware like Clop that encrypts files until payment is made; fake Windows updates that are actually ransomware in disguise; Zeus Gameover malware that steals bank account details; and the growing ransomware-as-a-service industry. It also covers news malware that uses current events to target individuals; fleeceware apps that overcharge users; IoT device attacks to access passwords and spy on users; and threats from social engineering, cryptojacking, and potential future AI-based attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views20 pages

Clop Ransomware

The document discusses various types of cyber threats including ransomware like Clop that encrypts files until payment is made; fake Windows updates that are actually ransomware in disguise; Zeus Gameover malware that steals bank account details; and the growing ransomware-as-a-service industry. It also covers news malware that uses current events to target individuals; fleeceware apps that overcharge users; IoT device attacks to access passwords and spy on users; and threats from social engineering, cryptojacking, and potential future AI-based attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

1.

CLOP RANSOMWARE
Ransomware is malware which encrypts your files until you pay a ransom to the hackers.
“Clop” is one of the latest and most dangerous ransomware threats. It’s a variant of the well-
known CryptoMix ransomware, which frequently targets Windows users.
Before beginning the encryption process, the Clop ransomware blocks over 600 Windows
processes and disables multiple Windows 10 applications, including Windows Defender and
Microsoft Security Essentials — leaving you with zero chance of protecting your data.
The Clop ransomware has evolved since its inception, now targeting entire networks — not
just individual devices. Even the Maastricht University in the Netherlands became a victim
of the Clop ransomware, with almost all Windows devices on the university’s network being
encrypted and forced to pay a ransom.
EXAMPLE OF CLOP RANSOMEWARE
2. FAKE WINDOWS UPDATES
(HIDDEN RANSOMWARE)
Hackers have been increasingly sending emails that instruct readers to install
urgent Windows OS updates. The emails trick readers into installing the “latest”
Windows updates, which are actually ransomware ‘.exe’ files in disguise.
The ransomware contained in these emails is known as “Cyborg”. It encrypts
all of your files and programs and demands a ransom payment to un-encrypt
the files.
Unfortunately, many email service providers and basic antivirus software aren’t
able to detect and block these emails.
EXAMPLE OF FAKE WINDOWS UPDATES
(HIDDEN RANSOMWARE)
3. ZEUS GAMEOVER
Zeus Gameover is part of the “Zeus” family of malware and viruses. This
piece of malware is a Trojan — malware disguised as something legitimate —
that accesses your sensitive bank account details and steals all of your funds.
The worst thing about this particular variant of the Zeus malware family is
that it doesn’t require a centralized “Command and Control” server to
complete transactions — which is a flaw found in many cyberattacks that
authorities can target. Instead, Zeus Gameover can bypass centralized servers
and create independent servers to send sensitive information. In essence, you
cannot trace your stolen data.
EXAMPLE OF ZEUS GAMEOVER
4. RAAS
“RaaS” — also known as “Ransomware as a Service” — is a
growing industry in the underground hacker community. People
without the knowledge to carry out a sophisticated ransomware
attack can pay to hire a professional hacker or team of hackers to
perform the attack for them.
The growth of the underground RaaS industry is worrying, as it
shows how easy it is to infect people with ransomware despite the
bad actors having no previous experience with designing or
coding malware.
EXAMPLE OF RAAS
5. NEWS MALWARE ATTACKS
Cybercriminals often use current news stories and global events to target
people with malware.
One example is hackers using the wave of the COVID-19 (Coronavirus)
outbreak to target individuals with malware. Hackers send out emails that
are disguised as legitimate information about the outbreak. Readers
are prompted to click a link to learn more about the information, but the
link contains malware that copies the files on your device and steals your
personal information.
Research currently focuses on the spread of this malware in Japan. Still, it
will become an issue worldwide during any kind of newsworthy outbreak.
EXAMPLE OF NEWS MALWARE ATTACKS
6. FLEECEWARE
Fleeceware continues to charge app users large amounts of
money despite users deleting those apps. Recent research has found
that over 600 million Android users have downloaded “Fleeceware”
onto their device in the past few years.
Although Fleeceware doesn’t pose a considerable security threat to
a user’s device and data, it’s still very common, and it’s a shady
practice by app developers wanting to cash in on unsuspecting users.
EXAMPLE OF FLEECEWARE
7. IOT DEVICE ATTACKS
As the popularity of IoT (Internet of Things) devices grows in 2020 — things like smart
speakers and video doorbells — hackers are looking to exploit these devices for valuable
information.
There are multiple reasons why hackers choose to target IoT devices. For one, most IoT
devices don’t have enough storage to install proper security measures. These devices
often contain easy-to-access data such as passwords and usernames, which then can be used
by hackers to log into user accounts and steal valuable information, such as banking details.
Hackers can also use internet-based cameras and mics to spy on and communicate with people
— including young children via smart baby monitors.
These devices can also act as weak points in a corporation’s network, meaning hackers can
gain access to entire systems through unsecured IoT devices — spreading malware to other
devices across the network.
EXAMPLE OF IOT DEVICE ATTACKS
8. SOCIAL ENGINEERING
• Humans are possibly the weakest link in any security protocol. This is why cybercriminals
are now turning to human psychology and deception to try and gain access to personal
information.
• The hacker will start by contacting a company or service provider and pretend to be a
specific person. They’ll ask questions regarding the victim’s account and trick the customer
support team into handing over pieces of sensitive information. Then, they’ll exploit that
information to gain access to a person’s account and data, including payment details.
• Although this isn’t a type of malware per se, social engineering is an alarming trend, as
it doesn’t require hackers to know about coding or malware development. Instead, all the
attacker needs is to be convincing and allow human error and complacency to reward them
with the data they need.
EXAMPLE OF SOCIAL ENGINEERING
9. CRYPTOJACKING
Cryptojacking malware is designed to use a person’s computing power to
help “mine” cryptocurrencies, such as Bitcoin. Mining requires a huge
amount of computing power to generate new crypto coins, which is
why hackers are attempting to install cryptojacking malware on computers
and mobile devices to help with the mining process — slowing down the
user’s device considerably.
Although cryptojacking attacks dropped significantly in previous years —
mainly due to the sharp fall in the value of cryptocurrencies, this trend
remains a threat. As cryptocurrency prices continue to rise through
2020, cryptojacking malware attacks will continue to be lucrative for
cybercriminals.
EXAMPLE OF CRYPTOJACKING
10. ARTIFICIAL INTELLIGENCE (AI) ATTACKS
• As more tools become available to developers who want to program AI
scripts and software, hackers will be able to use this same technology to
carry out devastating cyberattacks.
• Although cybersecurity companies are using artificial intelligence and
machine learning algorithms to help combat malware, these technologies can
also be exploited to hack devices and networks on a massive scale.  
• Cyberattacks can often cost cybercriminals a lot in terms of time and
resources. So, with the expansion of AI and machine learning technologies,
we can only expect hackers to develop highly-advanced and destructive AI-
based malware in 2020 and beyond.
EXAMPLE OF ARTIFICIAL INTELLIGENCE (AI)
ATTACKS

You might also like