WEBVTT

00:00:00.400 --> 00:00:07.120
ladies and gents i am about to do the unthinkable i'm

00:00:05.040 --> 00:00:10.719
going to intentionally infect myself with one of the worst cyber security

00:00:08.720 --> 00:00:14.320
threats of our time ransomware

00:00:12.800 --> 00:00:17.920
wannacry.exe that sounds like a fun game

00:00:18.720 --> 00:00:24.080
oh oh disk part 32-bit

00:00:24.160 --> 00:00:31.599
that's not something i have installed you guys see that

00:00:28.080 --> 00:00:33.280
my pictures are all gone downloads

00:00:31.599 --> 00:00:39.600
videos all my files have been replaced

00:00:36.800 --> 00:00:44.719
by these encrypted containers and please readme.txt question what's

00:00:42.160 --> 00:00:48.559
wrong with my files oops your important files are encrypted you will not be able

00:00:46.640 --> 00:00:56.239
to access them anymore whoa your files will be lost on january 7th

00:00:52.320 --> 00:00:57.280
send 600 worth of bitcoin well that

00:00:56.239 --> 00:01:02.640
sucks lucky for us we can just use the money

00:00:59.840 --> 00:01:07.119
that acronis sent over to us to sponsor this video oh and by the way no we're

00:01:05.199 --> 00:01:11.680
not sending them any money because we're going to be using a cronus's latest true

00:01:09.200 --> 00:01:15.760
image 2020 software to get back the files we lost while showing off some of

00:01:14.000 --> 00:01:20.700
their machine learning and cyber security features that will help protect

00:01:18.080 --> 00:01:28.799
us in the future

00:01:28.799 --> 00:01:36.000
the basic principle of ransomware and cryptojacking is this the user clicks on

00:01:33.520 --> 00:01:41.920
a link to a free cruise then the software encrypts the user's files and

00:01:38.799 --> 00:01:44.640
as the name implies demands a ransom for

00:01:41.920 --> 00:01:48.720
the luxury of accessing the files ever again it's like opening your door to a

00:01:46.720 --> 00:01:52.560
friendly looking old lady but instead of complimenting you on your fashion

00:01:50.079 --> 00:01:57.119
choices lttstore.com by the way she roundhouse kicks you steals your car

00:01:54.320 --> 00:02:01.759
keys and then demands 0.1 bitcoins to have them back and the problem is that

00:01:59.600 --> 00:02:07.600
while some ransomwares have been defeated in many cases there is simply

00:02:04.799 --> 00:02:13.040
no way to decrypt the files without actually paying the ransom so we wanted

00:02:10.399 --> 00:02:18.879
to put a cronus up against no before's ren sim software which simulates 15

00:02:16.480 --> 00:02:22.959
ransomware infection scenarios and one crypto mining scenario the purpose of

00:02:21.040 --> 00:02:27.840
this is to test your current network protection in a safe environment and

00:02:25.280 --> 00:02:32.879
ransom installs its own dummy files so that our super confidential files won't

00:02:30.239 --> 00:02:36.720
be accessed by the way guys yes we turned off all network connections

00:02:35.120 --> 00:02:40.000
physically on this thing before running this otherwise it could really have

00:02:38.400 --> 00:02:45.519
junked up our network please do not do this at home so let's try ransom without

00:02:42.640 --> 00:02:50.640
any protection and 16 out of 16 scenarios gobbled away at

00:02:48.480 --> 00:02:55.120
our system as for just running Windows defender well it actually did manage to

00:02:52.720 --> 00:02:57.599
block one of them but the other 15 would have ended up wreaking havoc on our

00:02:56.560 --> 00:03:02.480
machine big oof as the kids say with acronis

00:03:00.400 --> 00:03:06.879
true image act of protection it managed to flag all the activity and all 16 of

00:03:05.040 --> 00:03:11.200
the scenarios were defended against as long as we clicked block when the pop-up

00:03:08.879 --> 00:03:15.200
came up do note though that if you don't click block it won't defend against it

00:03:13.280 --> 00:03:18.400
that's to avoid it blocking false positives

00:03:16.400 --> 00:03:22.720
active protection works by constantly observing data access patterns on not

00:03:20.080 --> 00:03:28.640
only your system but also on both of acronis's infected and non-infected

00:03:25.280 --> 00:03:30.400
processing farms the acronis cloud ai

00:03:28.640 --> 00:03:34.959
then uses machine learning to build models for detecting suspicious behavior

00:03:33.040 --> 00:03:38.959
when a model is created it's pushed to all their customers so that on their

00:03:36.959 --> 00:03:42.879
system the software can act preemptively preventing a malicious data breach from

00:03:40.799 --> 00:03:48.080
bringing judgment day to your device now in the event that genuine data access

00:03:45.200 --> 00:03:52.799
behavior is altered such as updated software or unique activity acronis

00:03:50.480 --> 00:03:56.159
active protection is capable of creating and maintaining an adjustable whitelist

00:03:54.720 --> 00:04:01.360
and blacklist of programs you guys actually saw that when we intentionally

00:03:58.239 --> 00:04:03.599
added wannacry to our whitelist normally

00:04:01.360 --> 00:04:07.920
you wouldn't do that so we're gonna want to fix this nonsense

00:04:06.000 --> 00:04:13.519
background wallpaper that's sending us helpful reminders to pay up squirt and

00:04:10.720 --> 00:04:18.000
get back our private and important files because we made a full system backup of

00:04:15.680 --> 00:04:22.639
this device using a cronus true image we can simply restore it to a previous

00:04:20.000 --> 00:04:25.840
version and obtain all of our precious files back

00:04:23.840 --> 00:04:30.479
by navigating to the recovery tab we can see all of our previous backups both the

00:04:28.080 --> 00:04:34.479
full system ones and each incremental backup so then restoring the system back

00:04:33.120 --> 00:04:39.600
to the state that it was in before we ever saw that luxury cruise advert is

00:04:36.880 --> 00:04:43.280
about 30 minutes with all of our files accessible again ransomware zero acronis

00:04:42.400 --> 00:04:47.919
one so let's show how we use true image 2020

00:04:45.840 --> 00:04:51.199
to do this it starts with downloading it from the acronis website running the

00:04:49.520 --> 00:04:54.800
installation and then upon startup following the quick start guide through

00:04:52.800 --> 00:04:58.800
the setup and major features run down here acronis offers a 30-day trial if

00:04:57.280 --> 00:05:03.280
you want to try it out before you buy but honestly even your granddad could do

00:05:01.040 --> 00:05:07.840
this allowing him to keep his mind sweeper high scores and outdated memes

00:05:05.680 --> 00:05:12.400
both safe and sound we used this feature here to make a

00:05:09.759 --> 00:05:16.560
mirror image of the entire system backing up everything all the way down

00:05:14.080 --> 00:05:20.800
to our drivers system preferences and virtual machines so that the image can

00:05:18.560 --> 00:05:25.199
later be used to recover the entire pc and all of its content and the thing is

00:05:22.880 --> 00:05:30.080
that this can be useful even outside of ransomware infections like if our

00:05:27.120 --> 00:05:33.759
machine was ever lost or damaged the tier that we're using also has five

00:05:31.919 --> 00:05:37.680
terabytes of acronis's cloud storage meaning that we are following the three

00:05:35.360 --> 00:05:42.479
two one principle for our data backup by having an off-site copy with the added

00:05:40.080 --> 00:05:46.320
benefit of acronis's cloud working like other cloud storage services and

00:05:44.240 --> 00:05:49.759
allowing individual files to be migrated to any other device

00:05:48.080 --> 00:05:54.479
with one account you can protect up to five Windows or macOS machines and an

00:05:52.320 --> 00:05:58.639
unlimited number of Android and iOS mobile devices along with your office

00:05:56.320 --> 00:06:03.360
365 data so if you're sick of losing data or you dance with lady luck on

00:06:01.199 --> 00:06:07.120
dodgy sites far too often click the link in the description to head over to

00:06:04.639 --> 00:06:10.880
acronis's website it's got lots more features that we didn't cover today like

00:06:09.039 --> 00:06:15.120
deduplication to speed up the image creation process master boot record

00:06:12.960 --> 00:06:19.440
protection and its own self-defense mechanism to keep malware from shutting

00:06:17.280 --> 00:06:23.199
it down for a limited time guys just for LTT viewers acronis is offering a

00:06:21.280 --> 00:06:27.520
discount on its true image software so head on over there at the link below now

00:06:26.080 --> 00:06:31.680
thanks again to acronis for sponsoring this video we'll see you guys in the next one
