Evolving Threat Agents: Ransomware and their Variants

نویسندگان

  • Toshima Singh Rajput
  • Sharon K. John
  • Theresa DuBose
  • Anthony Pinto
  • Kevin Savage
  • Peter Coogan
  • Hon Lau
چکیده

This paper studies different kinds of ransomware attacks right from its point of origin to the latest kind of ransomware attacks. As this malware threat has reported a significant increase in the number of report incidents happenings in countries like USA, UK and India. A study of its evolution provides for its first line of defense. So the paper offers an awareness of different kinds of ransomware variants from 1989 to 2017. It also analyses the effects of this malware on Android and Windows platform. After describing these variants it also presents the attack vectors of the Ransomware revolution. The paper also provides guidelines on preventing the losses by avoiding infection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RAPPER: blueRansomware bluePrevention via bluePerformance Counters

Ransomware can produce direct and controllable economic loss, which makes it one of the most prominent threats in cyber security. As per the latest statistics, more than half of malwares reported in Q1 of 2017 are ransomware and there is a potent threat of a novice cybercriminals accessing rasomware-as-a-service. The concept of public-key based data kidnapping and subsequent extortion was intro...

متن کامل

Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

Recent statistics show that in 2015 more than 140 millions new malware samples have been found. Among these, a large portion is due to ransomware, the class of malware whose specific goal is to render the victim’s system unusable, in particular by encrypting important files, and then ask the user to pay a ransom to revert the damage. Several ransomware include sophisticated packing techniques, ...

متن کامل

Economic Analysis of Ransomware

We present in this work an economic analysis of ransomware, with relevant data from Cryptolocker, CryptoWall, TeslaCrypt and other major strands. We include a detailed study of the impact that different price discrimination strategies can have on the success of a ransomware family, examining uniform pricing, optimal price discrimination and bargaining strategies and analysing their advantages a...

متن کامل

Ransomware: A Rising Threat of new age Digital Extortion

What if someone stopped you from accessing your files or even using your computer? What if they demanded an amount to get the access back to you? With most financial and social interactions revolving around three critical aspects – firstly the use of digital data and files, secondly computer systems and last the unsecure internet. This is where Ransomware using Bitcoin has become a major cause ...

متن کامل

Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics

Ransomware is currently the key threat for individual as well as corporate Internet users. Especially dangerous is crypto ransomware that encrypts important user data and it is only possible to recover it once a ransom has been paid. Therefore devising efficient and effective countermeasures is a rising necessity. In this paper we present a novel Software-Defined Networking (SDN) based detectio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017