Time
49 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
My name is David. Keep radios. And today we're gonna be going through course one out of two.
00:04
This course will be focusing on malware. The second course will be focusing on Ransomware.
00:10
So for today's demo, what we're going to do is the following
00:14
pretending that I'm an end user and I'm going to check my email in this case, Proton. Now
00:19
I am receiving email that says, Take a look at this great offer on Mac books, assuming that I'm looking for coupons and this entices me,
00:27
the email states saved today a mackerel pro and other devices with the coupon listed in the attached file.
00:33
So now I'm standing. Wow, this is very interesting. Yes, I'd like to go ahead in and download this,
00:38
so I'm gonna simply click on the download button
00:42
and I want to save this as
00:44
a file to my desktop.
00:46
And the foul name is Mac Book Pro Deals.
00:49
So going to run it
00:53
now, knowing that my computer is safe. Sometimes these messages will come up as a security
00:59
concerned, et cetera.
01:00
So let's go back to her this time.
01:03
Now in my cyber folder,
01:04
what I have is Mac Book items to purchase
01:08
and ensure that look for coupons for the following. I'm looking for a MacBook Pro on that book air and also an iPad.
01:15
Great. So now I want to go ahead and say, Well, what is this coupon code
01:22
now? Most when those machines are protected and these will come out from time to time
01:26
but not knowing any better? Let's just say OK, I have no problem. Let's run this anyway,
01:33
once I run this and noticed that nothing's happening.
01:38
Did I miss something? Uh, no, I didn't. So now I said, Wait a minute in my cyber a folder.
01:45
I now have a file that has an extension of DOT locked,
01:49
So if I try to open it,
01:52
there's no specific application that can open an extension of that locked.
01:56
So I'm gonna go ahead and say, Let's just remove that.
02:00
Let's bring it back to a text file
02:01
and we're going to rename it.
02:05
And once I open it,
02:07
it's now encrypted.
02:09
So now I'm saying, What does this read it?
02:14
Your files are now encrypted. Please sign enough for the cyber. A pro membership.
02:19
Now I'm confused, and at this point in time I would have to potentially de encrypted or at some point maybe send some Bitcoin. Excedrin. This is just an example of how typical. Now, where would run
02:30
in the next course? We're gonna be going over what Ransomware is. So stay tuned. Thank you for this. Look forward to seeing you in the next video.

Up Next

Malware Threats

This malware analysis training course covers basic information about things like viruses, worms, Trojans, ransomware, and more.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor
Instructor Profile Image
Dave Kupratis
Instructor