Crypto has servedan important role in securing sensitive data throughout the years, but ransomware has flipped this script on its head by leveraging crypto as a meansto instead prevent users from accessing their own data. The crypto seen inransomware covers a wide range of complexity of symmetric and asymmetric algorithms, but flaws in their implementation and key storage / transmission routines have left the door open for users to retrieve their data in certain cases. In this talk, I'll provide a glimpse into some of the more notable ransomware crypto implementations that have surfaced over the past fewyears and how their weaknesses were exploited by security researchers through reverse engineering and cryptanalysis.
Mark is a Senior MalwareResearcher for Endgame. Throughout his career in software engineering andcomputer security, he has served in prominent technical leadership roles in the research and development of advanced computer network operations tools and has provided malware analysis and reverse engineering subject matterexpertise to a diverse range of government and commercial clients in the Washington, D.C. metropolitan area. Twitter handle of presenter(s): @magerbomb Website of presenter(s) or content: https://www.endgame.com/our-experts/mark-mager