Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Watering Hole Attack

22703 Jyotish Sharma

22705 Pratik Nair

A watering hole attack is a type of cyber-attack that targets a specific group of users by compromising a website or web application they are known to visit.

What Is a Watering Hole Attack?

Attackers will infect a website with malicious code, allowing them to gain access to the computers of unsuspecting visitors.

Watering Hole Attack

History:

History:

CCleaner Attack 2017

Attack on Polish Banks in 2016

Lucky Mouse Attack in China 2017-18

The NotPetya Attack

NotPetya works by encrypting the files on a computer, making them inaccessible to the user. It then demands a ransom payment in order to unlock the files. If the ransom is not paid, the files will remain encrypted.

The NotPetya Attack

How Did The NotPetya Attack Work?

  • Attack originated from an update of a Ukrainian tax accounting package called MeDoc developed by Intellect Service.
  • MeDoc was widely used among tax accountants in Ukraine
  • MeDoc had about 400,000 customers across Ukraine, representing about 90% of the country's domestic firms
  • Used The EternalBlue Exploit

How Did The NotPetya Attack Work?

Execution

  • Compromised MeDoc server pushes out an update on 27 June 2017

  • Millions of computers infected by the not petya ransomware

  • Ransom of $300 requested by the hackers to retrieve data

  • No Kill Switch found in NotPetya

Responding To The Attack

Responding To The Attack

  • Disconnect the infected computer from the network.
  • Boot the computer from an external source
  • Run a malware removal tool:
  • Restore data from backups

Update And Patch

Advanced email security solutions

Preventing The Attack

Back Up And Restore

Preventing The Attack

Windows Server Message Block (SMB) patches

Learn more about creating dynamic, engaging presentations with Prezi