{"video_id":"cg4rfeX4m_E","title":"I deliberately downloaded ransomware… - Acronis True Image 2020 Showcase","channel":"Linus Tech Tips","show":"Linus Tech Tips","published_at":"2020-05-05T14:53:29Z","duration_s":390,"segments":[{"start_s":0.4,"end_s":7.12,"text":"ladies and gents i am about to do the unthinkable i'm","speaker":null,"is_sponsor":0},{"start_s":5.04,"end_s":10.719,"text":"going to intentionally infect myself with one of the worst cyber security","speaker":null,"is_sponsor":0},{"start_s":8.72,"end_s":14.32,"text":"threats of our time ransomware","speaker":null,"is_sponsor":0},{"start_s":12.8,"end_s":17.92,"text":"wannacry.exe that sounds like a fun game","speaker":null,"is_sponsor":0},{"start_s":18.72,"end_s":24.08,"text":"oh oh disk part 32-bit","speaker":null,"is_sponsor":0},{"start_s":24.16,"end_s":31.599,"text":"that's not something i have installed you guys see that","speaker":null,"is_sponsor":0},{"start_s":28.08,"end_s":33.28,"text":"my pictures are all gone downloads","speaker":null,"is_sponsor":0},{"start_s":31.599,"end_s":39.6,"text":"videos all my files have been replaced","speaker":null,"is_sponsor":0},{"start_s":36.8,"end_s":44.719,"text":"by these encrypted containers and please readme.txt question what's","speaker":null,"is_sponsor":0},{"start_s":42.16,"end_s":48.559,"text":"wrong with my files oops your important files are encrypted you will not be able","speaker":null,"is_sponsor":0},{"start_s":46.64,"end_s":56.239,"text":"to access them anymore whoa your files will be lost on january 7th","speaker":null,"is_sponsor":0},{"start_s":52.32,"end_s":57.28,"text":"send 600 worth of bitcoin well that","speaker":null,"is_sponsor":0},{"start_s":56.239,"end_s":62.64,"text":"sucks lucky for us we can just use the money","speaker":null,"is_sponsor":0},{"start_s":59.84,"end_s":67.119,"text":"that acronis sent over to us to sponsor this video oh and by the way no we're","speaker":null,"is_sponsor":0},{"start_s":65.199,"end_s":71.68,"text":"not sending them any money because we're going to be using a cronus's latest true","speaker":null,"is_sponsor":0},{"start_s":69.2,"end_s":75.76,"text":"image 2020 software to get back the files we lost while showing off some of","speaker":null,"is_sponsor":0},{"start_s":74.0,"end_s":80.7,"text":"their machine learning and cyber security features that will help protect","speaker":null,"is_sponsor":0},{"start_s":78.08,"end_s":88.799,"text":"us in the future","speaker":null,"is_sponsor":0},{"start_s":88.799,"end_s":96.0,"text":"the basic principle of ransomware and cryptojacking is this the user clicks on","speaker":null,"is_sponsor":0},{"start_s":93.52,"end_s":101.92,"text":"a link to a free cruise then the software encrypts the user's files and","speaker":null,"is_sponsor":0},{"start_s":98.799,"end_s":104.64,"text":"as the name implies demands a ransom for","speaker":null,"is_sponsor":0},{"start_s":101.92,"end_s":108.72,"text":"the luxury of accessing the files ever again it's like opening your door to a","speaker":null,"is_sponsor":0},{"start_s":106.72,"end_s":112.56,"text":"friendly looking old lady but instead of complimenting you on your fashion","speaker":null,"is_sponsor":0},{"start_s":110.079,"end_s":117.119,"text":"choices lttstore.com by the way she roundhouse kicks you steals your car","speaker":null,"is_sponsor":0},{"start_s":114.32,"end_s":121.759,"text":"keys and then demands 0.1 bitcoins to have them back and the problem is that","speaker":null,"is_sponsor":0},{"start_s":119.6,"end_s":127.6,"text":"while some ransomwares have been defeated in many cases there is simply","speaker":null,"is_sponsor":0},{"start_s":124.799,"end_s":133.04,"text":"no way to decrypt the files without actually paying the ransom so we wanted","speaker":null,"is_sponsor":0},{"start_s":130.399,"end_s":138.879,"text":"to put a cronus up against no before's ren sim software which simulates 15","speaker":null,"is_sponsor":0},{"start_s":136.48,"end_s":142.959,"text":"ransomware infection scenarios and one crypto mining scenario the purpose of","speaker":null,"is_sponsor":0},{"start_s":141.04,"end_s":147.84,"text":"this is to test your current network protection in a safe environment and","speaker":null,"is_sponsor":0},{"start_s":145.28,"end_s":152.879,"text":"ransom installs its own dummy files so that our super confidential files won't","speaker":null,"is_sponsor":0},{"start_s":150.239,"end_s":156.72,"text":"be accessed by the way guys yes we turned off all network connections","speaker":null,"is_sponsor":0},{"start_s":155.12,"end_s":160.0,"text":"physically on this thing before running this otherwise it could really have","speaker":null,"is_sponsor":0},{"start_s":158.4,"end_s":165.519,"text":"junked up our network please do not do this at home so let's try ransom without","speaker":null,"is_sponsor":0},{"start_s":162.64,"end_s":170.64,"text":"any protection and 16 out of 16 scenarios gobbled away at","speaker":null,"is_sponsor":0},{"start_s":168.48,"end_s":175.12,"text":"our system as for just running Windows defender well it actually did manage to","speaker":null,"is_sponsor":0},{"start_s":172.72,"end_s":177.599,"text":"block one of them but the other 15 would have ended up wreaking havoc on our","speaker":null,"is_sponsor":0},{"start_s":176.56,"end_s":182.48,"text":"machine big oof as the kids say with acronis","speaker":null,"is_sponsor":0},{"start_s":180.4,"end_s":186.879,"text":"true image act of protection it managed to flag all the activity and all 16 of","speaker":null,"is_sponsor":0},{"start_s":185.04,"end_s":191.2,"text":"the scenarios were defended against as long as we clicked block when the pop-up","speaker":null,"is_sponsor":0},{"start_s":188.879,"end_s":195.2,"text":"came up do note though that if you don't click block it won't defend against it","speaker":null,"is_sponsor":0},{"start_s":193.28,"end_s":198.4,"text":"that's to avoid it blocking false positives","speaker":null,"is_sponsor":0},{"start_s":196.4,"end_s":202.72,"text":"active protection works by constantly observing data access patterns on not","speaker":null,"is_sponsor":0},{"start_s":200.08,"end_s":208.64,"text":"only your system but also on both of acronis's infected and non-infected","speaker":null,"is_sponsor":0},{"start_s":205.28,"end_s":210.4,"text":"processing farms the acronis cloud ai","speaker":null,"is_sponsor":0},{"start_s":208.64,"end_s":214.959,"text":"then uses machine learning to build models for detecting suspicious behavior","speaker":null,"is_sponsor":0},{"start_s":213.04,"end_s":218.959,"text":"when a model is created it's pushed to all their customers so that on their","speaker":null,"is_sponsor":0},{"start_s":216.959,"end_s":222.879,"text":"system the software can act preemptively preventing a malicious data breach from","speaker":null,"is_sponsor":0},{"start_s":220.799,"end_s":228.08,"text":"bringing judgment day to your device now in the event that genuine data access","speaker":null,"is_sponsor":0},{"start_s":225.2,"end_s":232.799,"text":"behavior is altered such as updated software or unique activity acronis","speaker":null,"is_sponsor":0},{"start_s":230.48,"end_s":236.159,"text":"active protection is capable of creating and maintaining an adjustable whitelist","speaker":null,"is_sponsor":0},{"start_s":234.72,"end_s":241.36,"text":"and blacklist of programs you guys actually saw that when we intentionally","speaker":null,"is_sponsor":0},{"start_s":238.239,"end_s":243.599,"text":"added wannacry to our whitelist normally","speaker":null,"is_sponsor":0},{"start_s":241.36,"end_s":247.92,"text":"you wouldn't do that so we're gonna want to fix this nonsense","speaker":null,"is_sponsor":0},{"start_s":246.0,"end_s":253.519,"text":"background wallpaper that's sending us helpful reminders to pay up squirt and","speaker":null,"is_sponsor":0},{"start_s":250.72,"end_s":258.0,"text":"get back our private and important files because we made a full system backup of","speaker":null,"is_sponsor":0},{"start_s":255.68,"end_s":262.639,"text":"this device using a cronus true image we can simply restore it to a previous","speaker":null,"is_sponsor":0},{"start_s":260.0,"end_s":265.84,"text":"version and obtain all of our precious files back","speaker":null,"is_sponsor":0},{"start_s":263.84,"end_s":270.479,"text":"by navigating to the recovery tab we can see all of our previous backups both the","speaker":null,"is_sponsor":0},{"start_s":268.08,"end_s":274.479,"text":"full system ones and each incremental backup so then restoring the system back","speaker":null,"is_sponsor":0},{"start_s":273.12,"end_s":279.6,"text":"to the state that it was in before we ever saw that luxury cruise advert is","speaker":null,"is_sponsor":0},{"start_s":276.88,"end_s":283.28,"text":"about 30 minutes with all of our files accessible again ransomware zero acronis","speaker":null,"is_sponsor":0},{"start_s":282.4,"end_s":287.919,"text":"one so let's show how we use true image 2020","speaker":null,"is_sponsor":0},{"start_s":285.84,"end_s":291.199,"text":"to do this it starts with downloading it from the acronis website running the","speaker":null,"is_sponsor":0},{"start_s":289.52,"end_s":294.8,"text":"installation and then upon startup following the quick start guide through","speaker":null,"is_sponsor":0},{"start_s":292.8,"end_s":298.8,"text":"the setup and major features run down here acronis offers a 30-day trial if","speaker":null,"is_sponsor":0},{"start_s":297.28,"end_s":303.28,"text":"you want to try it out before you buy but honestly even your granddad could do","speaker":null,"is_sponsor":0},{"start_s":301.04,"end_s":307.84,"text":"this allowing him to keep his mind sweeper high scores and outdated memes","speaker":null,"is_sponsor":0},{"start_s":305.68,"end_s":312.4,"text":"both safe and sound we used this feature here to make a","speaker":null,"is_sponsor":0},{"start_s":309.759,"end_s":316.56,"text":"mirror image of the entire system backing up everything all the way down","speaker":null,"is_sponsor":0},{"start_s":314.08,"end_s":320.8,"text":"to our drivers system preferences and virtual machines so that the image can","speaker":null,"is_sponsor":0},{"start_s":318.56,"end_s":325.199,"text":"later be used to recover the entire pc and all of its content and the thing is","speaker":null,"is_sponsor":0},{"start_s":322.88,"end_s":330.08,"text":"that this can be useful even outside of ransomware infections like if our","speaker":null,"is_sponsor":0},{"start_s":327.12,"end_s":333.759,"text":"machine was ever lost or damaged the tier that we're using also has five","speaker":null,"is_sponsor":0},{"start_s":331.919,"end_s":337.68,"text":"terabytes of acronis's cloud storage meaning that we are following the three","speaker":null,"is_sponsor":0},{"start_s":335.36,"end_s":342.479,"text":"two one principle for our data backup by having an off-site copy with the added","speaker":null,"is_sponsor":0},{"start_s":340.08,"end_s":346.32,"text":"benefit of acronis's cloud working like other cloud storage services and","speaker":null,"is_sponsor":0},{"start_s":344.24,"end_s":349.759,"text":"allowing individual files to be migrated to any other device","speaker":null,"is_sponsor":0},{"start_s":348.08,"end_s":354.479,"text":"with one account you can protect up to five Windows or macOS machines and an","speaker":null,"is_sponsor":0},{"start_s":352.32,"end_s":358.639,"text":"unlimited number of Android and iOS mobile devices along with your office","speaker":null,"is_sponsor":0},{"start_s":356.32,"end_s":363.36,"text":"365 data so if you're sick of losing data or you dance with lady luck on","speaker":null,"is_sponsor":0},{"start_s":361.199,"end_s":367.12,"text":"dodgy sites far too often click the link in the description to head over to","speaker":null,"is_sponsor":0},{"start_s":364.639,"end_s":370.88,"text":"acronis's website it's got lots more features that we didn't cover today like","speaker":null,"is_sponsor":0},{"start_s":369.039,"end_s":375.12,"text":"deduplication to speed up the image creation process master boot record","speaker":null,"is_sponsor":0},{"start_s":372.96,"end_s":379.44,"text":"protection and its own self-defense mechanism to keep malware from shutting","speaker":null,"is_sponsor":0},{"start_s":377.28,"end_s":383.199,"text":"it down for a limited time guys just for LTT viewers acronis is offering a","speaker":null,"is_sponsor":0},{"start_s":381.28,"end_s":387.52,"text":"discount on its true image software so head on over there at the link below now","speaker":null,"is_sponsor":0},{"start_s":386.08,"end_s":391.68,"text":"thanks again to acronis for sponsoring this video we'll see you guys in the next one","speaker":null,"is_sponsor":0}],"full_text":"ladies and gents i am about to do the unthinkable i'm going to intentionally infect myself with one of the worst cyber security threats of our time ransomware wannacry.exe that sounds like a fun game oh oh disk part 32-bit that's not something i have installed you guys see that my pictures are all gone downloads videos all my files have been replaced by these encrypted containers and please readme.txt question what's wrong with my files oops your important files are encrypted you will not be able to access them anymore whoa your files will be lost on january 7th send 600 worth of bitcoin well that sucks lucky for us we can just use the money that acronis sent over to us to sponsor this video oh and by the way no we're not sending them any money because we're going to be using a cronus's latest true image 2020 software to get back the files we lost while showing off some of their machine learning and cyber security features that will help protect us in the future the basic principle of ransomware and cryptojacking is this the user clicks on a link to a free cruise then the software encrypts the user's files and as the name implies demands a ransom for the luxury of accessing the files ever again it's like opening your door to a friendly looking old lady but instead of complimenting you on your fashion choices lttstore.com by the way she roundhouse kicks you steals your car keys and then demands 0.1 bitcoins to have them back and the problem is that while some ransomwares have been defeated in many cases there is simply no way to decrypt the files without actually paying the ransom so we wanted to put a cronus up against no before's ren sim software which simulates 15 ransomware infection scenarios and one crypto mining scenario the purpose of this is to test your current network protection in a safe environment and ransom installs its own dummy files so that our super confidential files won't be accessed by the way guys yes we turned off all network connections physically on this thing before running this otherwise it could really have junked up our network please do not do this at home so let's try ransom without any protection and 16 out of 16 scenarios gobbled away at our system as for just running Windows defender well it actually did manage to block one of them but the other 15 would have ended up wreaking havoc on our machine big oof as the kids say with acronis true image act of protection it managed to flag all the activity and all 16 of the scenarios were defended against as long as we clicked block when the pop-up came up do note though that if you don't click block it won't defend against it that's to avoid it blocking false positives active protection works by constantly observing data access patterns on not only your system but also on both of acronis's infected and non-infected processing farms the acronis cloud ai then uses machine learning to build models for detecting suspicious behavior when a model is created it's pushed to all their customers so that on their system the software can act preemptively preventing a malicious data breach from bringing judgment day to your device now in the event that genuine data access behavior is altered such as updated software or unique activity acronis active protection is capable of creating and maintaining an adjustable whitelist and blacklist of programs you guys actually saw that when we intentionally added wannacry to our whitelist normally you wouldn't do that so we're gonna want to fix this nonsense background wallpaper that's sending us helpful reminders to pay up squirt and get back our private and important files because we made a full system backup of this device using a cronus true image we can simply restore it to a previous version and obtain all of our precious files back by navigating to the recovery tab we can see all of our previous backups both the full system ones and each incremental backup so then restoring the system back to the state that it was in before we ever saw that luxury cruise advert is about 30 minutes with all of our files accessible again ransomware zero acronis one so let's show how we use true image 2020 to do this it starts with downloading it from the acronis website running the installation and then upon startup following the quick start guide through the setup and major features run down here acronis offers a 30-day trial if you want to try it out before you buy but honestly even your granddad could do this allowing him to keep his mind sweeper high scores and outdated memes both safe and sound we used this feature here to make a mirror image of the entire system backing up everything all the way down to our drivers system preferences and virtual machines so that the image can later be used to recover the entire pc and all of its content and the thing is that this can be useful even outside of ransomware infections like if our machine was ever lost or damaged the tier that we're using also has five terabytes of acronis's cloud storage meaning that we are following the three two one principle for our data backup by having an off-site copy with the added benefit of acronis's cloud working like other cloud storage services and allowing individual files to be migrated to any other device with one account you can protect up to five Windows or macOS machines and an unlimited number of Android and iOS mobile devices along with your office 365 data so if you're sick of losing data or you dance with lady luck on dodgy sites far too often click the link in the description to head over to acronis's website it's got lots more features that we didn't cover today like deduplication to speed up the image creation process master boot record protection and its own self-defense mechanism to keep malware from shutting it down for a limited time guys just for LTT viewers acronis is offering a discount on its true image software so head on over there at the link below now thanks again to acronis for sponsoring this video we'll see you guys in the next one"}