Cyber Attacks #2 Flashcards
(13 cards)
What happens in Personal Document Ransom?
Ransomware encrypts specific files
What are 2 ways ransomeware can be spread?
Phishing email (macro on attachment downloads and executes payload)
How does decryption happen after a Personal Document Ransom attack?
Victim pays the ransom or a security firms releases a decryptor
How did WannaCry spread?
As a worm, infects local network and random machines on the Internet
What allowed WannaCry to execute ransomware?
EternalBlue exploit
What is are the three levels of Personal Document Ransom?
Original, Double Extortion, Triple Extortion
What happens in the Original Extortion?
Enrypt the data
What happens in Double Extortion?
Exfiltrate data and threaten to disclose in ransom not paid quickly
What happens in Triple Extortion?
Threaten to leak data unless paid
What may randomware groups also search for?
Local servers that contain data backups, and delete/encrypt these
What is Cryptojacking?
Malicious Cryptomining, using someone else’s processing power
How does Cryptojacking stay hidden?
Mine data while computer is idle
In dat breaches, what 3 things may happen to stolen data?
Public Disclosure, Private Intelligence, Sold on Black Market