My name is David. Keep radios. And today we're gonna be going through course one out of two.
This course will be focusing on malware. The second course will be focusing on Ransomware.
So for today's demo, what we're going to do is the following
pretending that I'm an end user and I'm going to check my email in this case, Proton. Now
I am receiving email that says, Take a look at this great offer on Mac books, assuming that I'm looking for coupons and this entices me,
the email states saved today a mackerel pro and other devices with the coupon listed in the attached file.
So now I'm standing. Wow, this is very interesting. Yes, I'd like to go ahead in and download this,
so I'm gonna simply click on the download button
and I want to save this as
a file to my desktop.
And the foul name is Mac Book Pro Deals.
So going to run it
now, knowing that my computer is safe. Sometimes these messages will come up as a security
concerned, et cetera.
So let's go back to her this time.
Now in my cyber folder,
what I have is Mac Book items to purchase
and ensure that look for coupons for the following. I'm looking for a MacBook Pro on that book air and also an iPad.
Great. So now I want to go ahead and say, Well, what is this coupon code
now? Most when those machines are protected and these will come out from time to time
but not knowing any better? Let's just say OK, I have no problem. Let's run this anyway,
once I run this and noticed that nothing's happening.
Did I miss something? Uh, no, I didn't. So now I said, Wait a minute in my cyber a folder.
I now have a file that has an extension of DOT locked,
So if I try to open it,
there's no specific application that can open an extension of that locked.
So I'm gonna go ahead and say, Let's just remove that.
Let's bring it back to a text file
and we're going to rename it.
And once I open it,
it's now encrypted.
So now I'm saying, What does this read it?
Your files are now encrypted. Please sign enough for the cyber. A pro membership.
Now I'm confused, and at this point in time I would have to potentially de encrypted or at some point maybe send some Bitcoin. Excedrin. This is just an example of how typical. Now, where would run
in the next course? We're gonna be going over what Ransomware is. So stay tuned. Thank you for this. Look forward to seeing you in the next video.