Dark Reading Radio
Pay Up Or Never See Your Data Again: Ransomware Raises The Stakes
Date / Time: Wednesday, June 04, 2014, 1:00 PM New York/10:00 AM San Francisco
Overview:

You’ve heard the stories, or maybe know someone who has experienced having their laptop or workstation held for ransom by criminals you can’t even see but have literally locked out the victim with nasty ransomware malware, demanding payment to release it. The most onerous such threat is CryptoLocker, which encrypts the victim’s local drive and network shares with strong asymmetric encryption and demands the victim pay a fee to unlock them. And even if you dutifully pay the ransom fee to the attacker, there’s no guarantee you will ever retrieve the data on your machine.

So how can you prevent or defend against this nasty and more destructive form of ransomware? In this episode of Dark Reading Radio, Lance James, a renowned security expert and head of cyber intelligence at Deloitte & Touche, will provide a peek at his upcoming presentation for Black Hat USA on new research and developments on how the threat intelligence community has responded to CryptoLocker such as the creation of a near-time tracking of the ransomware operation’s infrastructure, and what can be done in the future to defend against this potentially devastating attack.



Speaker(s):
Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2329
Published: 2015-08-31
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by ...

CVE-2014-2330
Published: 2015-08-31
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown ...

CVE-2014-2331
Published: 2015-08-31
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

CVE-2014-2332
Published: 2015-08-31
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

CVE-2014-2570
Published: 2015-08-31
Cross-site scripting (XSS) vulnerability in www/make_subset.php in PHP Font Lib before 0.3.1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.