1
00:00:00,400 --> 00:00:07,120
ladies and gents i am about to do the unthinkable i'm

2
00:00:05,040 --> 00:00:10,719
going to intentionally infect myself with one of the worst cyber security

3
00:00:08,720 --> 00:00:14,320
threats of our time ransomware

4
00:00:12,800 --> 00:00:17,920
wannacry.exe that sounds like a fun game

5
00:00:18,720 --> 00:00:24,080
oh oh disk part 32-bit

6
00:00:24,160 --> 00:00:31,599
that's not something i have installed you guys see that

7
00:00:28,080 --> 00:00:33,280
my pictures are all gone downloads

8
00:00:31,599 --> 00:00:39,600
videos all my files have been replaced

9
00:00:36,800 --> 00:00:44,719
by these encrypted containers and please readme.txt question what's

10
00:00:42,160 --> 00:00:48,559
wrong with my files oops your important files are encrypted you will not be able

11
00:00:46,640 --> 00:00:56,239
to access them anymore whoa your files will be lost on january 7th

12
00:00:52,320 --> 00:00:57,280
send 600 worth of bitcoin well that

13
00:00:56,239 --> 00:01:02,640
sucks lucky for us we can just use the money

14
00:00:59,840 --> 00:01:07,119
that acronis sent over to us to sponsor this video oh and by the way no we're

15
00:01:05,199 --> 00:01:11,680
not sending them any money because we're going to be using a cronus's latest true

16
00:01:09,200 --> 00:01:15,760
image 2020 software to get back the files we lost while showing off some of

17
00:01:14,000 --> 00:01:20,700
their machine learning and cyber security features that will help protect

18
00:01:18,080 --> 00:01:28,799
us in the future

19
00:01:28,799 --> 00:01:36,000
the basic principle of ransomware and cryptojacking is this the user clicks on

20
00:01:33,520 --> 00:01:41,920
a link to a free cruise then the software encrypts the user's files and

21
00:01:38,799 --> 00:01:44,640
as the name implies demands a ransom for

22
00:01:41,920 --> 00:01:48,720
the luxury of accessing the files ever again it's like opening your door to a

23
00:01:46,720 --> 00:01:52,560
friendly looking old lady but instead of complimenting you on your fashion

24
00:01:50,079 --> 00:01:57,119
choices lttstore.com by the way she roundhouse kicks you steals your car

25
00:01:54,320 --> 00:02:01,759
keys and then demands 0.1 bitcoins to have them back and the problem is that

26
00:01:59,600 --> 00:02:07,600
while some ransomwares have been defeated in many cases there is simply

27
00:02:04,799 --> 00:02:13,040
no way to decrypt the files without actually paying the ransom so we wanted

28
00:02:10,399 --> 00:02:18,879
to put a cronus up against no before's ren sim software which simulates 15

29
00:02:16,480 --> 00:02:22,959
ransomware infection scenarios and one crypto mining scenario the purpose of

30
00:02:21,040 --> 00:02:27,840
this is to test your current network protection in a safe environment and

31
00:02:25,280 --> 00:02:32,879
ransom installs its own dummy files so that our super confidential files won't

32
00:02:30,239 --> 00:02:36,720
be accessed by the way guys yes we turned off all network connections

33
00:02:35,120 --> 00:02:40,000
physically on this thing before running this otherwise it could really have

34
00:02:38,400 --> 00:02:45,519
junked up our network please do not do this at home so let's try ransom without

35
00:02:42,640 --> 00:02:50,640
any protection and 16 out of 16 scenarios gobbled away at

36
00:02:48,480 --> 00:02:55,120
our system as for just running Windows defender well it actually did manage to

37
00:02:52,720 --> 00:02:57,599
block one of them but the other 15 would have ended up wreaking havoc on our

38
00:02:56,560 --> 00:03:02,480
machine big oof as the kids say with acronis

39
00:03:00,400 --> 00:03:06,879
true image act of protection it managed to flag all the activity and all 16 of

40
00:03:05,040 --> 00:03:11,200
the scenarios were defended against as long as we clicked block when the pop-up

41
00:03:08,879 --> 00:03:15,200
came up do note though that if you don't click block it won't defend against it

42
00:03:13,280 --> 00:03:18,400
that's to avoid it blocking false positives

43
00:03:16,400 --> 00:03:22,720
active protection works by constantly observing data access patterns on not

44
00:03:20,080 --> 00:03:28,640
only your system but also on both of acronis's infected and non-infected

45
00:03:25,280 --> 00:03:30,400
processing farms the acronis cloud ai

46
00:03:28,640 --> 00:03:34,959
then uses machine learning to build models for detecting suspicious behavior

47
00:03:33,040 --> 00:03:38,959
when a model is created it's pushed to all their customers so that on their

48
00:03:36,959 --> 00:03:42,879
system the software can act preemptively preventing a malicious data breach from

49
00:03:40,799 --> 00:03:48,080
bringing judgment day to your device now in the event that genuine data access

50
00:03:45,200 --> 00:03:52,799
behavior is altered such as updated software or unique activity acronis

51
00:03:50,480 --> 00:03:56,159
active protection is capable of creating and maintaining an adjustable whitelist

52
00:03:54,720 --> 00:04:01,360
and blacklist of programs you guys actually saw that when we intentionally

53
00:03:58,239 --> 00:04:03,599
added wannacry to our whitelist normally

54
00:04:01,360 --> 00:04:07,920
you wouldn't do that so we're gonna want to fix this nonsense

55
00:04:06,000 --> 00:04:13,519
background wallpaper that's sending us helpful reminders to pay up squirt and

56
00:04:10,720 --> 00:04:18,000
get back our private and important files because we made a full system backup of

57
00:04:15,680 --> 00:04:22,639
this device using a cronus true image we can simply restore it to a previous

58
00:04:20,000 --> 00:04:25,840
version and obtain all of our precious files back

59
00:04:23,840 --> 00:04:30,479
by navigating to the recovery tab we can see all of our previous backups both the

60
00:04:28,080 --> 00:04:34,479
full system ones and each incremental backup so then restoring the system back

61
00:04:33,120 --> 00:04:39,600
to the state that it was in before we ever saw that luxury cruise advert is

62
00:04:36,880 --> 00:04:43,280
about 30 minutes with all of our files accessible again ransomware zero acronis

63
00:04:42,400 --> 00:04:47,919
one so let's show how we use true image 2020

64
00:04:45,840 --> 00:04:51,199
to do this it starts with downloading it from the acronis website running the

65
00:04:49,520 --> 00:04:54,800
installation and then upon startup following the quick start guide through

66
00:04:52,800 --> 00:04:58,800
the setup and major features run down here acronis offers a 30-day trial if

67
00:04:57,280 --> 00:05:03,280
you want to try it out before you buy but honestly even your granddad could do

68
00:05:01,040 --> 00:05:07,840
this allowing him to keep his mind sweeper high scores and outdated memes

69
00:05:05,680 --> 00:05:12,400
both safe and sound we used this feature here to make a

70
00:05:09,759 --> 00:05:16,560
mirror image of the entire system backing up everything all the way down

71
00:05:14,080 --> 00:05:20,800
to our drivers system preferences and virtual machines so that the image can

72
00:05:18,560 --> 00:05:25,199
later be used to recover the entire pc and all of its content and the thing is

73
00:05:22,880 --> 00:05:30,080
that this can be useful even outside of ransomware infections like if our

74
00:05:27,120 --> 00:05:33,759
machine was ever lost or damaged the tier that we're using also has five

75
00:05:31,919 --> 00:05:37,680
terabytes of acronis's cloud storage meaning that we are following the three

76
00:05:35,360 --> 00:05:42,479
two one principle for our data backup by having an off-site copy with the added

77
00:05:40,080 --> 00:05:46,320
benefit of acronis's cloud working like other cloud storage services and

78
00:05:44,240 --> 00:05:49,759
allowing individual files to be migrated to any other device

79
00:05:48,080 --> 00:05:54,479
with one account you can protect up to five Windows or macOS machines and an

80
00:05:52,320 --> 00:05:58,639
unlimited number of Android and iOS mobile devices along with your office

81
00:05:56,320 --> 00:06:03,360
365 data so if you're sick of losing data or you dance with lady luck on

82
00:06:01,199 --> 00:06:07,120
dodgy sites far too often click the link in the description to head over to

83
00:06:04,639 --> 00:06:10,880
acronis's website it's got lots more features that we didn't cover today like

84
00:06:09,039 --> 00:06:15,120
deduplication to speed up the image creation process master boot record

85
00:06:12,960 --> 00:06:19,440
protection and its own self-defense mechanism to keep malware from shutting

86
00:06:17,280 --> 00:06:23,199
it down for a limited time guys just for LTT viewers acronis is offering a

87
00:06:21,280 --> 00:06:27,520
discount on its true image software so head on over there at the link below now

88
00:06:26,080 --> 00:06:31,680
thanks again to acronis for sponsoring this video we'll see you guys in the next one
