Dark Reading Radio
Pay Up Or Never See Your Data Again: Ransomware Raises The Stakes
Date / Time: Wednesday, June 04, 2014, 1:00 PM New York/10:00 AM San Francisco
Overview:

Youíve heard the stories, or maybe know someone who has experienced having their laptop or workstation held for ransom by criminals you canít even see but have literally locked out the victim with nasty ransomware malware, demanding payment to release it. The most onerous such threat is CryptoLocker, which encrypts the victimís local drive and network shares with strong asymmetric encryption and demands the victim pay a fee to unlock them. And even if you dutifully pay the ransom fee to the attacker, thereís no guarantee you will ever retrieve the data on your machine.

So how can you prevent or defend against this nasty and more destructive form of ransomware? In this episode of Dark Reading Radio, Lance James, a renowned security expert and head of cyber intelligence at Deloitte & Touche, will provide a peek at his upcoming presentation for Black Hat USA on new research and developments on how the threat intelligence community has responded to CryptoLocker such as the creation of a near-time tracking of the ransomware operationís infrastructure, and what can be done in the future to defend against this potentially devastating attack.



Speaker(s):
Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.