1.7 Ransomware Example

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 7 minutes
Difficulty
Intermediate
Video Transcription
00:00
Hey, everyone. So in the last video, we wrapped up our discussion on cyber attacks. So we talked about things like ransomware and fishing. And in this video, I just wanted to show you some hands on experience with Ransomware without actually getting attacked by Ransomware. So what I've done is I've grabbed a couple of videos from a course that Dave could practice,
00:18
and I both worked on called amount, where threats that's available in this I bury website. So if you want to take a deeper look into malware,
00:24
various forms like viruses and worms, that's definitely a good course for you to check out
00:29
if you don't care about any of that. But you did want to see an example of Ransomware, then that's why I looked him up in this course so you can take a look at what that is before you were moving to module to. We're gonna take a look at a couple of different things, so date's going to show you Number one. What happens when you double click on the file that you may be downloaded from your email or something like that that actually has
00:48
ransomware, innit?
00:49
And so he's just gonna double click and especially just gonna lock the files and he'll show you what that looks like. And then right after that, he's going to show you the wannacry Ransomware. Now he's modified it. So that way, it's not actually attacking his system. But he's going to show you what that looked like if you were never attacked within. Hopefully you were not. But he's gonna go ahead and show you
01:07
what that looks like is well through some things were going ransomware.
01:11
So again, I just want to show you those quick couple of videos. They're gonna be in succession here. See, I won't be coming back on after them, so I'm just gonna let you know that s o we'll move into after this video will move right into module to we're gonna take a look at some different case study examples of the security rules, what has talked through through some different scenarios.
01:29
And then after that, we're moving to actually using the S r. A tool. But again, I want to give you some
01:33
examples. You can visualize what it looks like for a ransomware attack.
01:38
My name is David. Keep radios. And today we're gonna be going through course one out of two.
01:42
This course will be focusing on malware. The second course will be focusing on Ransomware.
01:49
So for today's demo, what we're going to do is the following
01:52
pretending that I'm an end user and I'm going to check my email in this case, Proton. Now
01:57
I am receiving email that says, Take a look at this great offer on Mac books
02:01
assuming that I'm looking for coupons and this entices me
02:06
the email states saved today I'm Mac Wit Pro and other devices with the coupon listed in the attached file.
02:12
So now I'm standing. Wow, this is very interesting. Yes, I'd like to go ahead and download this,
02:16
so I'm gonna simply click on the download button
02:21
and I want to save this as
02:23
a file to my desktop.
02:24
And the foul name is Mac Book Pro Deals.
02:28
So go in and run it
02:31
now, knowing that my computer is safe. Sometimes these messages will come up as a security
02:37
concerned, et cetera.
02:38
So let's go back to her this time,
02:40
then my cyber folder.
02:44
What I have is Mac book items to purchase
02:46
and ensure that look for coupons for the following. I'm looking for a MacBook Pro on that book air and also an iPad.
02:53
Great. So now I want to go ahead and say, Well, what is this coupon code
03:00
now? Most when those machines are protected and these will come out from time to time
03:05
but not knowing any better? Let's just say OK, I have no problem. Let's run this anyway,
03:12
once I run this and noticed that nothing's happening.
03:16
Did I miss something? Uh, no, I didn't. So now I said, Wait a minute in my cyber a folder.
03:23
I now have a file that has an extension of dot locks,
03:28
so if I try to open it,
03:30
there's no specific application that can open an extension of that locked.
03:35
So I'm gonna go ahead and say, Let's just remove that.
03:38
Let's bring it back to a text file
03:40
and we're going to rename it.
03:44
And once I open it,
03:46
it's now encrypted.
03:49
So now I'm saying, What does this read it?
03:52
Your files are now encrypted. Please sign enough for the cyber. A pro membership.
03:58
Now I'm confused, and at this point in time, I would have to potentially de encrypted or at some point, maybe send some Bitcoin Excedrin. This is just an example of how typical. Now, where would run
04:10
in the next course? We're gonna be going over what Ransomware is. So stay tuned. Thank you for this.
04:15
Look forward to seeing you in the next video. We'll welcome back to the chorus. My name is David Prays and then the secondary video. I'm very excited to show you an example of a ransomware
04:25
typically known as the wanna Cry virus.
04:28
So what I have done, basically in this virtual machine is I've installed an application called Blue Stacks.
04:33
Now, through this, what I've done is I've modified the actual wanna cry virus.
04:39
You are free to go and and research and see how this could be done in an actual environment. What would happen is that
04:45
this would lower and actually take up your entire screen
04:47
for all *** dentals and purposes. This is just basically show you how such a ransomware attack would work. So worried about 98 99%. Ah, threshold. Once his loads, I'd like to go over and show you exactly how such a virus would work
05:05
Now, in future labs et cetera. I'm gonna be showing my own demo and how to create an actual uh, ransomware. However, this is for ethical purpose is just to make a notation.
05:16
And in addition to that, what I will be doing is showcasing how to deflect this and how to make sure that even if you are hit with a ransom or attack,
05:26
how to go ahead and go through
05:28
and remove this. So, assuming that this is my actual environment right now, this is I'm gonna go ahead.
05:33
And what I want to do is I see a Facebook. I can't see a star icon. Now, how would I unlock this
05:40
now? Here we go. Oops. Your files have been encrypted.
05:44
So once I'm hit with a ransomware attack, it's gonna give me a countdown so pendant will be raised on. This is just an example. I've modified a little bit of the content and your files will be lost on said ST
05:56
so you can send $300 worth of Bitcoin to the following address, etcetera. How do you pay? This is how people are hit with a ransomware attack.
06:05
So what I'd like to do in future videos is the go ahead and show how we can decrypt us because you do not need to pay Bitcoin. You didn't need to pay any kind of Cryptocurrency etcetera and most people will actually have the understanding. Well, with I go into safe mode, et cetera through Windows
06:23
that I could actually get rid of this. That mayor may not be true. However, with that being said, I'm very excited to showcase my future videos and coarse content.
06:31
I'd like to thank you very much for this. Any questions, comments, concerns, et cetera could always be sent out to me and again, the future of videos. We will be going over this in further detail, thank you very much and have a great day.
Up Next