COURSE 7 – CYBERSECURITY CAPSTONE: BREACH RESPONSE CASE STUDIES

Module 5: Ransomware

IBM CYBERSECURITY ANALYST PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – Ransomware

In this module, participants will embark on a crucial exploration of Ransomware breaches and their profound implications for organizations, illuminated through compelling case studies. Ransomware, a pervasive cyber threat, poses significant risks to the integrity, operations, and reputation of businesses worldwide. Through the lens of real-world scenarios, learners will delve into the multifaceted impacts of these breaches, spanning from financial losses and operational disruptions to erosion of trust and brand damage.

This immersive journey aims to equip individuals with a comprehensive understanding of Ransomware’s tactics, vulnerabilities, and the critical importance of robust cybersecurity measures. By dissecting case studies, participants will gain actionable insights to fortify organizational defenses and mitigate the risks posed by this escalating cyber threat landscape.

Learning Objectives

  • List measures that could have prevented the Atlanta ransomware breach
  • Describe the cost and impact of the Atlanta ransomware breach
  • Identify vulnerabilities exploited in the Atlanta ransomware breach
  • Summarize the timeline of the Atlanta ransomware breach
  • Identify techniques used to extract money from ransomware victims
  • List common examples of ransomware
  • Identify techniques for protecting against ransomware attacks
  • Describe ways in which users become ransomware targets
  • Distinguish different types of ransomware
  • Explain what ransomware is

RANSOMWARE KNOWLEDGE CHECK

1. You get a pop-up message on your screen telling you that critical files on your system have been encrypted and that you must pay a fee to get the encryption key. What type of ransomware has attacked your system?

  • Blockware
  • Crypto (CORRECT)
  • Leakware/Doxware
  • Locker

2. Your bank sends you an email with your account statement attached. You think this is odd but open it anyway to see what it is. The document is blank so you close it and think no more about it. A few days later you realize that your computer is infected with malware. What attack vector was used to compromise your system?

  • Remote Desktop Protocol (RDP)
  • Malicious Links
  • Phishing (CORRECT)
  • Software Vulnerabilities

3. You take advantage of an Internet offer for free technical support and a live technician acutally does contact you, log into your computer and help you optimize your system. A few days later you notice some critical business files are missing when a big red message block appears on your screen demanding money if you ever want to see your files again. What attack vector is the malware exploiting?

  • Software Vulnerabilities
  • Phishing
  • Malicious Links
  • Remote Desktop Protocol (RDP) (CORRECT)

4. If you fail to patch your operating system and that fact allows a bad actor to install ransomware on your system, what was the likely attack vector?

  • Remote Desktop Protocol (RDP)
  • Software Vulnerabilities (CORRECT)
  • Malicious Links
  • Phishing

5. You read an interesting article online that contains links to related articles so you follow one of them and pretty soon you are a victim of a ransomware attack. What was the likely attack vector used by the bad actors?

  • Phishing
  • Remote Desktop Protocol (RDP)
  • Software Vulnerabilities
  • Malicious Links (CORRECT)

6. What is the most important thing to have in place that will save you from having to pay a ransom in the event you have fallen victim to a ransomware attack?

  • Fully patched operating system and applications
  • Strong passwords
  • Anti-virus software
  • A full system backup (CORRECT)

7. Which ransomware spread across 150 countries in 2017 and was responsible for over $4 billion in losses worldwide?

  • Bad Rabbit
  • GoldenEye
  • Jigsaw
  • WannaCry (CORRECT)

8. True or False. Projections are that ransomware will not be a significant problem in the future as operating systems become more secure and anti-malware applications gain in sophistication.

  • True
  • False (CORRECT)

RANSOMWARE GRADED ASSESSMENT

1. You get a pop-up message on your screen telling you have been locked out of your computer and that access will remain blocked until you pay a fee to have your access restored. What type of ransomware has attacked your system?

  • Blockware
  • Crypto
  • Locker (CORRECT)
  • Leakware/Doxware

2. You get a pop-up message on your screen telling you that embarrassing photos taken of you at a college party many years ago have been downloaded and will be made public unless you pay a fee. What type of ransomware has attacked your system?

  • Leakware/Doxware (CORRECT)
  • Blockware
  • Crypto
  • Locker

3. You get an email from your Internet service provider addressed to “Dear Customer” asking you to log in and verify your credentials due to “suspicious activity” detected in your account. This email is most likely trying to exploit which attack vector?

  • Remote Desktop Protocol (RDP)
  • Malicious Links
  • Phishing (CORRECT)
  • Software Vulnerabilities

4. A person you meet at a party offers to help you optimize your computer so you arrange for her to log in remotely. The next time you reboot your system, you get a pop-up message telling you all your critical files have been encrypted and you must pay a ransome to get the encryption key. What attack vector was used to exploit your system?

  • Phishing
  • Malicious Links
  • Software Vulnerabilities
  • Remote Desktop Protocol (RDP) (CORRECT)

5. You fear that the security patches sent out by the vendor of one of your products may introduce changes to what you are used to so you never allow the updates. What attack vector are you setting yourself up for?

  • Remote Desktop Protocol (RDP)
  • Software Vulnerabilities (CORRECT)
  • Phishing
  • Malicious Links

6. You log into your bank and see an offer for a 0% interest rate loan. You click on the link to check out the details and suddenly your computer is locked and there is a message demanding payment in order to unlock it. Your bank’s website was hacked! What attack vector was being used to install ransomware on your system?

  • Phishing
  • Remote Desktop Protocol (RDP)
  • Malicious Links (CORRECT)
  • Software Vulnerabilities

7. True or False. Being vigilant about email you receive, links your follow and websites you visit is an effective way to keep yourself safe from a ransomware attack.

  • True (CORRECT)
  • False

8. Which ransomware used fake Adobe Flash download websites to distribute and install ransomware?

  • Bad Rabbit (CORRECT)
  • GoldenEye
  • Jigsaw
  • WannaCry

9. True or False. It is feared that in the future our cars, homes and factories may fall victim to ransomware attacks as more and more devices join the Internet of Things.

  • True (CORRECT)
  • False

CONCLUSION – Ransomware

In conclusion, the study of Ransomware breaches and their impacts on organizations through case studies offers invaluable insights into the ever-evolving landscape of cybersecurity threats. By examining real-world examples, participants gain a deeper understanding of the devastating consequences Ransomware attacks can have on businesses, ranging from financial losses to operational disruptions and reputational harm.

Armed with this knowledge, individuals are empowered to implement proactive measures, such as robust cybersecurity protocols, employee training, and incident response plans, to safeguard against Ransomware threats effectively. Through continuous vigilance and strategic resilience-building efforts, organizations can navigate the challenges posed by Ransomware attacks with resilience, ensuring the protection of critical assets and the preservation of stakeholder trust in an increasingly digital world.