Essential Faqs to Combating Ransomware

Total Page:16

File Type:pdf, Size:1020Kb

Essential Faqs to Combating Ransomware ESSENTIAL FAQS TO COMBATING RANSOMWARE S e p t e m b e r 2016 www.ensilo.com RESEARCH PAPER TABLE OF CONTENTS What is Ransomware? 3 Does Ransomware Only Encrypt Files? 4 What Are the Common Types of Ransomware In-the-Wild? 4 How are Victims Infected? 4 At What Stage Does the Ransomware Encrypt the Data? 5 How Long Does it Take for Ransomware to Encrypt Files? 5 How are the Threat Actors Paid? 6 What Platforms does Ransomware Target? 6 Don’t the Operating System Vendors, such as Microsoft, Place 7 Protections to Prevent Ransomware from Running? Have You Seen Any Ransomware Cases? 7 Is Ransomware a Periodic Fad or a Trending Issue? 8 What Strategy Should Businesses Adopt to Combat Ransomware? 9 Samples of ransomware notes 10 About enSilo 11 RESEARCH PAPER Ransomware isn’t new. But the tactics are. Ransomware has gone from a nickel & dime operation targeting individual computers to a multimillion dollar criminal operation targeting organizations that can afford to pay enterprise-level payments. Research1 showed that a single threat actor was “making more than $30M USD annually from ransomware infections alone”. Clearly, with such a strong financial motivation behind ransomware, the threat criminals behind these types of attacks are not going to stop anytime soon. To help combat against the threat of ransomware, we’ve put together this FAQ. If you see any question you’d like to add, or just want to be heard, feel free to email us: [email protected] WHAT IS RANSOMWARE? Ransomware is an increasingly popular tactic used to steal data and disrupt a system’s operations. Essentially, ransomware is malware used by attackers to infect a device, hijack files on that device and lock them, via encryption. These maliciously encrypted files can no longer be accessed by users, and are held hostage by the attacker until a ransom is paid. The ransom can range from hundreds of dollars to hundreds of thousands, depending on the type of file and victim. Usually, the extortionists set a deadline for paying up and when that deadline is not met, a new deadline is set and the ransom rate increases. In 2013, the criminals responsible for CryptoLocker, a prolific type of ransomware, purportedly earned between $3 million and $27 million from victims. Only two years later, it was estimated that a gang of criminals who had built an infrastructure for ransomware infections, were able to earn about $30MUSD annually. 1 | http://talosintel.com/angler-exposed/?f_l=s 2 / 11 RESEARCH PAPER DOES RANSOMWARE ONLY ENCRYPT FILES? Ransomware usually comes in two flavors: one that encrypts files or one that locks out the user from their files. For example, the MBR locker family extorts victims by replacing the basic files of the operating system. Only upon payment do the original files come back up. No matter the type of ransomware, they are almost always effective in disrupting the business. W H A T A R E T H E COMMON TYPES OF RANSOMWARE IN - THE - WILD? Unfortunately, the list of ransomware is too long to name all. Here are a few of the more common ones: 777 CryptoHasYou Jigsaw PadCrypt 7ev3n CryptoJoker JobCrypter Rokku Alpha CryptoShocker KeRanger Samas AxCrypter CryptoWall LeChiffre SNSLocker BadBlock CryptXXX Locky Surprise BlackShades CrySiS Mischa TeslaCrypt Cerber CTB-Locker Mobef ToxCrypt Chimera DMA Locker NanoLocker Troldesh CoinVault Encryptor RaaS Nemucod TrueCrypter Crypt0L0cker Enigma Nemucod-7z zCrypt CryptoDefense HydraCrypt ODCODC Zyklon HOW ARE VICTIMS INFECTED? A user can be infected in a variety of manners, such as actively installing the ransomware (say, when it is appears as an innocuous program), opening a malicious file in an email (aka, a phishing attack) or surfing to a compromised website (aka, a drive-by-download attack). While in certain scenarios the victim had to be active and click on the malicious program, in most cases, the infection is actually seamless to the user. For instance, in a drive-by-download attack, the ransomware typically exploits a browser vulnerability enabling the automatic download and execution of the malicious file. In the case of a phishing email, a PDF vulnerability enables the attacker to hide malicious code within the PDF, so that it automatically executes upon opening. 4 / 11 RESEARCH PAPER AT WHAT STAGE DOES THE RANSOMWARE ENCRYPT THE DATA? Some ransomware is considered “online”, in which case once the ransomware is installed, it communicates with its Command & Control (C&C) server to receive the public key used for the encryption as well as to receive the TOR configuration. The TOR configuration is used as the discreet payment channel with the goal of keeping the transaction anonymous, blocking the ability to trace back the extortionist. Ransomware such as CryptoWall and Locky are online ransomware. Other ransomware are considered “offline” in which case the key is embedded within the ransom file itself. Offline ransomware are typically MBR lockers, such as Petya. HOW LONG DOES IT TAKE FOR RANSOMWARE TO ENCRYPT FILES? Encryption time depends on the file extensions existing on the victim’s machine, as well as how many files of these extensions exist. For example, if the ransomware just encrypts text files, the encryption process will be quick – even just a few seconds for small text files - while a file server will take longer to encrypt. Additionally, each ransomware uses its own preferable encryption algorithm. Some use “heftier” algorithms such as RSA and AES, in which case their encryption takes longer. RESEARCH PAPER HOW ARE THE THREAT ACTORS PAID? If a victim decides to pay up, payment is sometimes performed through BitCoin, and similar crypto- currencies, since BitCoin enables easy money laundering as well as does not leave an audit trail that can lead back to the threat actor. The transaction itself is performed using TOR services which anonymizes the users as well, so there is also no digital trail of the threat actor’s identity. WHAT PLATFORMS D O E S RANSOMWARE T A R G E T ? Ransomware targets users of all platforms – from Windows servers and desktop to Mac ransomware and those targeting Linux. While people are less aware of Mac ransomware, it is certainly on the rise with various ransomware families such as KeRanger and the Mabouia released as a Proof-of-Concept. Common ransomware targeting Linux is FileCoder. 6 / 11 RESEARCH PAPER But not only are desktops and servers hit with ransomware. Also mobile devices are being hit. For example, researchers recently2 discovered an Android-based ransomware where the malicious app locked users out of their device by changing the device PIN. Users were able to regain control of their device only through a factory reset. DON’T THE OPERATING SYSTEM VENDORS, SUCH AS MICROSOFT, PLACE PROTECTIONS TO PREVENT RANSOMWARE FROM RUNNING? Microsoft does attempt to fight ransomware. For example, since ransomware traditionally used Macros to infect devices, Microsoft added a new feature to Office 2016 which disables Macros. However, these mitigations do not stop the extortionists, rather they are simply a continuum of the cat and mouse chase, requiring the ransomware developers to release new strains that bypass protections. For instance, Locky or CryptXXX use Javascript within a zip file to infect a system, not Macros. HAVE YOU SEEN ANY RANSOMWARE CASES? Unfortunately, we witness ransomware infections in the wild. Interestingly, infections aren’t dependent on company size – as we’ve seen them across all organizational size, nor are they dependent on the security maturity and awareness at a company. The following case represents the kind of cases that we witness. At one of our customer deployments we came across the Jigsaw ransomware. An employee at the customer site received a Word document with an embedded macro. When the macro executed, it downloaded its payload – the actual Jigsaw ransomware – from a Command and Control server. Jigsaw then attempted to encrypt the files on the infected PC using a public key. enSilo, however, prevented the malicious encryption and alerted on the attempt: 2 | http://arstechnica.com/security/2015/09/new-android-ransomware-locks-out-victims-by-changing-lock-screen-pin/ 7 / 11 RESEARCH PAPER IS RANSOMWARE A PERIODIC FAD OR A TRENDING ISSUE? The proliferation of ransomware is predicted to only get worse. The success rates of these malicious campaigns continue to encourage cyber-criminals and entice more extortionists to join the ransomware bandwagon. In fact, ransomware is becoming more sophisticated and we’re now seeing a couple of new development trends: 1. Ransomware combining “stealer” capabilities, such as the theft of FTP passwords or the like, which allows an attacker to move around the organization. The idea is that it is not enough for the threat actors just to infiltrate the organization, but then to also infect the whole enterprise, and they do this through lateral movement. By infecting more machines, they do not just infect more people (equating to more ransom payments) but also cause greater impact. This lateral movement behavior takes on a similar characteristic to the worms that were in abundance 15 years ago. The ransomware and worms use the same techniques – some spread via USB and others perform lateral movement through networks. In terms of lateral movement, in the past the worms searched for hard-coded passwords to spread, and although hard-coded passwords have changed since, the idea of stealing passwords in order to spread has not. There are 3 ways in which ransomware can perform lateral movement: a. Implementing the lateral movement capability on their own. As part of the ransomware code, the authors developed their own modules that look for passwords, etc. 8 / 11 RESEARCH PAPER b. Using other Trojans that are considered “Stealers” by design.
Recommended publications
  • Malpedia: a Collaborative Effort to Inventorize the Malware Landscape
    Malpedia: A Collaborative Effort to Inventorize the Malware Landscape Daniel Plohmann @push_pnx [email protected] 2017-12-07 | Botconf, Montpellier Martin Clauß martin.clauß@fkie.fraunhofer.de Steffen Enders [email protected] Elmar Padilla [email protected] 1 © Cyber Analysis and Defense Department, Fraunhofer FKIE $whoami Daniel Plohmann Security Researcher @ Fraunhofer (Europe‘s largest organisation for applied research) Research Scope: Malware Analysis Reverse Engineering Automation 2 © Cyber Analysis and Defense Department, Fraunhofer FKIE Outline Summary Motivation (or: how it began) Approach The Malpedia Corpus & Platform A Comparative Structural Analysis of Windows Malware Future Plans / Conclusion 3 © Cyber Analysis and Defense Department, Fraunhofer FKIE Summary 4 © Cyber Analysis and Defense Department, Fraunhofer FKIE Summary TL;DR What is Malpedia? A free, independent, pooled resource for confidently labeled, unpacked reference samples for malware families and versions Meta data tracker for info such as references (analysis reports, blogs, …), YARA rules, actors, tied to these families Status (2017-12-01): 2491 samples for 669 families, multi-platform (WIN, ELF, APK, OSX, …) Our Contributions Definition of requirements for malware corpora and a reference corpus + platform implementing these A Comprehensive, quantitative static analysis of structural features for 446 Windows malware families 5 © Cyber Analysis and Defense Department, Fraunhofer FKIE Motivation … or
    [Show full text]
  • PETYA・JIGSAW・WANNACRY・ZEPTO・LOCKY Business Resilience = Data Resilience
    PETYA・JIGSAW・WANNACRY・ZEPTO・LOCKY Business Resilience = Data Resilience Speaker Introduction Brent Reichow From Minneapolis, Minnesota (USA) April 1992 Arrived in Chiba, Japan Work History LINC Computers (EDS), NTT-WT, PSINet (C&W) Stellent (Oracle), Internet Security Systems (ISS) July 2004 Co-founded Blueshift K.K. Blueshift Business Leading provider of data protection solutions delivering secure, off-site, disk based, data backup, and disaster recovery services to small, medium and large organizations Client Markets Automotive, education, financial services, healthcare, insurance, legal services, logistics, manufacturing, marketing, media, NPO, real estate, recruiting, retail and technology URL www.dataprotection.co.jp/www.dataprotection.jp Blueshift’s Cloud Backup Business A. Initial full backup is made, compressed and encrypted data is sent to public or private data center locations B. Additional schedule or manual backups, will transfer changed data (deltas) off-site (incremental forever Public or Private Client Site Data Centers • File Server • Mail Server C. Rapid restores (deltas /changed data) WAN / INTERNET • Database Server • Virtual Machine (VM) • Multiple restoration points in time • Cloud 2 Cloud • Restore in minutes not hours G. Retention Policy Administrator • 30 day, 1 year D. Security Location 2 • Longer options • All data is encrypted with 256 bit AES • Data remains encrypted in flight and at rest F. Remote Management E. Onsite Appliance (de-duplication, compression, encryption) • Email alerting functionality • LAN speed restores with local available storage • Manage multiple servers A Billion Dollar Industry So How Does Ransomware Work? Ransomware as a Service (RaaS) - Typically the Developer Receives 30% of Ransom Paid by Victims Zepto Ransomware Attack Internet Phishing Email Workstations USB File Database NAS Server Your computer files have been encrypted Your photos, videos, documents, etc… But, don’t worry! I have not deleted them, yet.
    [Show full text]
  • Analyzing Facebook, Twitter, and Google's Efforts to Combat Foreign
    PolicyBrief 2018 | No. 041 A Long Way To Go: Analyzing Facebook, Twitter, and Google’s Efforts to Combat Foreign Interference By Bradley Hanlon Executive Summary and improve verification standards for those hoping to publish political advertisements. Investments in Two years after the Russian government manipulated forward-looking measures have included internal social media to interfere in the 2016 U.S. presidential initiatives to critically assess vulnerabilities and external election, online information platforms continue to partnerships with civil society, academia, and fact- serve as mediums for such operations, including the checking organizations. They have also led to increased 2018 midterm elections. Under intense public criticism transparency about the behavior and content of accounts and congressional scrutiny, the three most prominent linked to the Russian operation against the 2016 and online information platforms – Facebook, Twitter, and 2018 elections, as well as other nation-state operations Google – have taken steps to address vulnerabilities and targeting Americans. to protect their users against information operations by actors linked to authoritarian regimes. However, given Though all of these steps are important, ongoing the ongoing nature of online authoritarian interference, vulnerabilities demand more urgent action by the the steps taken by these companies continue to fall platforms to secure the online information space against short. foreign manipulation, while ensuring American’s ability to engage freely in robust speech and debate. Six areas This report reviews and analyzes the steps taken by where Facebook, Twitter, and Google must take further online information platforms to better defend against steps include: foreign interference since 2016, adopting the framing of the Senate Intelligence Committee by focusing on • Focusing on behavior: Online information the largest and most influential online information platforms have unique insight into the platforms of Facebook, Twitter, and Google.
    [Show full text]
  • Male Homosocial Landscape
    MALE HOMOSOCIAL LANDSCAPE: FAULKNER,WRIGHT, HEMINGWAY, AND FITZGERALD A dissertation submitted To Kent State University in partial Fulfillment of the requirements for the Degree of Doctor of Philosophy by Masaya Takeuchi December, 2011 Dissertation written by Masaya Takeuchi B.A., Rikkyo University, 2001 M.A., Rikkyo University, 2004 Ph.D., Kent State University, 2011 Approved by Robert Trogdon , Chair, Doctoral Dissertation Committee Mark Bracher , Member, Doctoral Dissertation Committee Kevin Floyd , Member, Doctoral Dissertation Committee Elizabeth M. Smith-Pryor , Member, Doctoral Dissertation Committee Marilyn A. Norconk , Member, Doctoral Dissertation Committee Accepted by Donald M. Hassler , Interim Chair, English Department Timothy Moerland , Dean, College of Arts and Sciences ii TABLE OF CONTENTS Acknowledgments ……………………………………………………………………….iv Introduction …………………………………………………….………………………. 1 Part I: Chapter 1. ………………………………………………………………………………. 26 2. …………………..…………………………………………………………... 59 Part II: Chapter 3. ………………...……………………………………………………………... 93 Part III: Chapter 4. ……………...……………………………………………………………… 122 5. ………..……………………………………………………………………. 163 Part IV: Chapter 6. ……...……………………………………………………………………… 190 7. ……………………………………………………………………………... 225 Conclusion …………………………………………………………………………….. 254 Bibliography ….………………………………………..……………………………..... 261 iii Acknowledgements During the eight years I have studied in Ph.D. programs at Rikkyo University and Kent State University, I have received tremendous instruction and encouragement from many professors.
    [Show full text]
  • December 2004 Letters to the Editor 3
    DEAR EDITOR, Wireless Security: A Discussion Rik Farrow writes in the August ;login: that “the downside of Note from Rob Kolstad: This article [offshoring] is that real com- summarizes an email discussion munication between software between Marcus Ranum and Bill developers and program man- Cheswick after Marcus had an letters to agers will get even worse.” This “interesting experience” at the presumes a model where devel- USENIX Security Conference. the editor opers only communicate with Thanks to both of them for allow- managers, not directly with ing us to share it publicly in order users. My advice for how to be- to foster discussion. come offshoring-proof is to edu- cate yourself in contextual de- MARCUS RANUM: sign (or any of the other meth- odologies that likewise pre- I had an interesting experience at sumes extensive contact be- the USENIX Security Conference, tween developers and users), and I’d like to share it here for dis- and to complement your com- cussion. Like many conference puting skills with a liberal-arts attendees, I took advantage of the education, which will develop wireless network so I could check your communication skills and my email, update my Web site, etc. your ability to understand non- At virtually every USENIX confer- computing perspectives. ence, someone sets up dsniff and collects passwords as they cross the MAX HAILPERIN wireless, and this latest conference [email protected] was no exception. For the past few http://www.gustavus.edu/+max/ years I’ve basically chosen to ignore the snoopers because, frankly, I hoped they’d grow up and go away.
    [Show full text]
  • Ransomware 2017
    Internet Security Threat Report ISTR Ransomware 2017 An ISTR Special Report Analyst: Dick O’Brien July 2017 Contents Executive summary and Key findings Ransomware: An overview A new breed of threat: WannaCry and Petya Businesses in the crosshairs Affecting the bottom line: Impact of ransomware How ransomware is spread Major ransomware threats Protection and best practices Internet Security Threat Report Contents 3 Executive summary and key findings 28 02 Contain 29 Advanced antivirus engine 5 Ransomware: An overview 29 SONAR behavior engine 8 A new breed of threat: WannaCry 29 Sapient – machine learning and Petya 29 Best practice 9 How WannaCry spread and how it was stopped 29 Ongoing development 9 What is EternalBlue? 29 03 Respond 10 Poor implantation, poor returns 29 Incident Response 10 Petya: Different threat, similar tactics 29 Best practices 10 Who was behind the WannaCry attacks? 30 Appendix: Symantec detections for 11 How Petya was spread common ransomware families 11 Ransomware or wiper? 34 About Symantec 12 Ransomware as a political tool 34 More Information 13 Businesses in the crosshairs 14 Worms are not the only threat 14 Targeted ransomware attacks Figures and Tables 15 Prevention is possible, a cure may not be 6 Ransomware infections by year 6 Ransomware infections by month 16 Affecting the bottom line: Impact of ransomware 6 Impact of WannaCry and Petya outbreaks on monthly infection rate 17 Ransom demands stabilize 6 Monthly ransomware infection numbers 17 Financial and reputational damage without WannaCry and Petya 18
    [Show full text]
  • Ransomware Destructive Attack
    Ransomware Destructive Attack Jay Spreitzer, Vice President, Cyber Threat Management Wells Fargo Bank About - Jay Spreitzer Has over 18 years information security experience. Over the last 10 years as a senior member of a cyber intelligence team at Wells Fargo. Prior to joining Wells Fargo Jay retired from the US Army, after 23 years of service working in various technology and information security roles. He holds a Masters in Information Assurance and Security as well as multiple computer security certifications. 53 What is ransomware? Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Some forms of ransomware systematically encrypt files on the system's hard drive, which become difficult or impossible to decrypt without paying the ransom for the encryption key, while some may simply lock the system and display messages intended to coax the user into paying. 54 What is ransomware? Ransomware wreaking havoc in American and Canadian hospitals Tech & Science March 23, 2016 Spike in ransomware spam prompts warnings Technology, March 10, 2015 Ransomware alert issued by US and Canada following recent attacks April 4, 2016, Big paydays force hospitals to prepare for ransomware attacks Tech, April 23, 2016 55 The first known ransomwares and its evolution § AIDS Diskette ransomware discovered in 1989. § Contained a warning message in the letter regarding licensing fee and penalty. § Users were supposed to send a license fee to a PO box in Panama for "PC Cyborg Corporation.” 56 The first known ransomwares and its evolution Creates the file ATTENTION!!!.txt in every folder in which § Gpcoder was ransomware it encoded a file.
    [Show full text]
  • The Definitive Cybersecurity Guide for Directors and Officers
    NAVIGATING THE DIGITAL AGE THE DIGITAL NAVIGATING | BENELUX CONTRIBUTORS • Alan Jenkins, Associate Partner, IBM Security, UK • J.R. Santos, Executive Vice President Research, Cloud Security Alliance, USA • Attila Narin, CTO, EMEA, Palo Alto Networks, Luxembourg • Judith Vieberink, Lawyer, First Lawyers, the Netherlands • Avi Berliner, Manager, PwC, USA • Kelvin Rorive, Delivery Manager Security IT Threat Management, Rabobank, the Netherlands • Chris Bray, Partner, Heidrick & Struggles, UK • Marcel Van Eemeren, CEO, ON2IT, the Netherlands • Christophe Crous, Head of Security, Proximus, Belgium • Mark Hughes, President, BT Security, BT Global Services, UK • Elena Kvochko, CIO, Group Security Function, Barclays, USA • Mark McLaughlin, CEO, Palo Alto Networks, USA • Fred Streefland, Senior Product Marketing Manager, EMEA, Palo Alto Networks, the Netherlands; former • Neelie Kroes, former Vice President to the European CISO, LeaseWeb Commission, the Netherlands • Gavin Colman, Partner, Heidrick & Struggles, UK • Peter Mesker, CTO, SecureLink, the Netherlands • Gilles Orringe, Partner, Heidrick & Struggles, UK • Polo van der Putt, Lawyer, Vondst Advocaten, the Netherlands THE DEFINITIVE CYBERSECURITY GUIDE • Graham Bolton, Chairman, Institute for Software Quality (IfSQ), UK • Puck Polter, Lawyer, Vondst Advocaten, the Netherlands FOR DIRECTORS AND OFFICERS • Greg Day, Vice President and Regional Chief Security • Raoul Vernède, Information Security Officer, Wageningen Officer, EMEA, Palo Alto Networks, UK University and Research, the Netherlands
    [Show full text]
  • Jumanji: the Case for Dynamic NUCA in the Datacenter
    Jumanji: The Case for Dynamic NUCA in the Datacenter Brian C. Schwedock Nathan Beckmann Carnegie Mellon University Carnegie Mellon University [email protected] [email protected] Abstract—The datacenter introduces new challenges for com- Core LLC bank Thread Lat-crit Core LLC bank Thread Lat-crit puter systems around tail latency and security. This paper argues that dynamic NUCA techniques are a better solution to these challenges than prior cache designs. We show that dynamic NUCA designs can meet tail-latency deadlines with much less cache space than prior work, and that they also provide a natural defense against cache attacks. Unfortunately, prior dynamic NUCAs have missed these opportunities because they focus exclusively on reducing data movement. (a) Jigsaw [6,8]. (b) Jumanji. We present Jumanji, a dynamic NUCA technique designed Fig. 1: Dynamic NUCA has natural advantages in the datacenter for tail latency and security. We show that prior last-level because it meets performance targets with fewer resources and cache designs are vulnerable to new attacks and offer imperfect physically isolates data from attackers. (a) However, Jigsaw, a performance isolation. Jumanji solves these problems while signif- state-of-the-art D-NUCA, is oblivious to tail latency and security, icantly improving performance of co-running batch applications. leading to missed deadlines and potential cache side channels. Moreover, Jumanji only requires lightweight hardware and a few (b) With simple changes, Jumanji enforces tail-latency deadlines simple changes to system software, similar to prior D-NUCAs. At and defends side channels at similar performance to Jigsaw. 20 cores, Jumanji improves batch weighted speedup by 14% on average, vs.
    [Show full text]
  • Analysis of Ransomware on Windows Platform
    IJCSNS International Journal of Computer Science and Network Security, VOL.20 No.6, June 2020 21 Analysis of Ransomware on Windows platform Adel Hamdan Mohammad Computer Science Department The world Islamic Sciences and Education University Amman-Jordan Summary dataset used in this research. Section four talks about Ransomware is a very serious problem which all organization related studies to this research. In section five, the author and individual may face. No doubt that ransomware cost demonstrates his experiments and analysis. Finally, in individual an organization billions of dollars. A lot of researchers section six, the author talks about his conclusion and talk about ransomware and its effect. The number of researches future works. that talk about ransomware still needs more investigation. In this research, the author analyzes the impact of ransomware only on windows platforms. The author select windows platform since windows is widely spread and used. Analyzing of ransomware 2. Ransomware Analysis is done based on analyzing the behavior of selected ransomware families. The author monitors the behavior of ransomware and There are several types of ransomware. some researcher which files are created during the infection process. The author says that ransomware has more than 100 forms and also demonstrates the encryption techniques used by patterns. Other researcher says that ransomware has three ransomware families. Finally, the author notes that protecting types and according to other researcher ransomware has Windows operating system is highly possible by monitoring only two main forms [4,5]. Most security and anti-virus system files and registry entry. companies tend to divide ransomware into two types Key words: which are crypto ransomware and locker ransomware Ransomware, encryption, ransomware behavior.
    [Show full text]
  • White Paper Template 9-10-15
    Comparative Analysis of Surveillance Laws and Practices in Latin America Katitza Rodríguez Pereda October 2016 1 The lead author of the “Comparative Analysis of Surveillance Laws and Practices in Latin America” is Electronic Frontier Foundation's (EFF) International Rights Director, Katitza Rodríguez Pereda. The legal review was done by EFF's Civil Liberties Director, David Greene. The technical review was done by EFF's Senior Staff Technologist, Seth Schoen. EFF's International Project Manager, Kim Carlson edited and formatted this report. EFF would like to thank Juan Camilo Rivera who consulted for EFF on this project, and Ana María Acosta, EFF Google Policy Fellow (2016), for their contributions to this report. EFF would like to thank the following individuals for their valuable input, assistance, and feedback in the preparation of this paper: Agustina Del Campo, Centro de Estudios en Libertad de Expresión y Acceso a la Información (Argentina) Ana Tuduri (Uruguay) Carolina Botero, Fundación Karisma (Colombia) Daniela Schnidrig, Global Partners Digital (Argentina) Dennys Antonialli, InternetLab (Brazil) Fabrizio Scrollini (Uruguay) Jacqueline Abreu, Internet Lab (Brazil) Jorge Gabriel Jímenez (Guatemala) Juan Carlos Lara, Derechos Digitales (Chile, Latin America) Juan Diego Castañeda Gómez, Fundación Karisma (Colombia) Leandro Ucciferri, Asociación por los Derechos Civiles (Argentina) Luciana Peri, Fundación Acceso (Central America) Luis Fernando García, R3D (Mexico) Maricarmen Sequera, TEDIC (Paraguay) Marlon Hernández Anzora (El Salvador)
    [Show full text]
  • 168 Ransomware: a New Era of Digital Terrorism Richa Indu1 And
    Ransomware: A New Era of Digital Terrorism Richa Indu1 and Anuj Sharma2 Department of Computer Science and Engineering, Institue of Technology Roorkee-247667, Uttarakhand, India Abstract: This work entails the study of ten nasty ransomwares to reveal out the analytical similarities and differences among them, which will help in understanding the mindset of cyber crooks crawling over the dark net. It also reviews the traps used by ransomware for its distribution and side by side examining the new possibilities of its dispersal. It concludes by divulging inter-relationship between various distribution approaches adopted by ransomwares and some attentive measures to hinder the ransomware and supporting alertness as ultimate tool of defense at user’s hand. Indexing terms/Keywords: Ransomware, malwares, botnets, cryptography, web crawlers Date of Publication: 2018-08-30 Volume: 01 Issue: 02 Journal: Computer Reviews Journal Website: https://purkh.com This work is licensed under a Creative Commons Attribution 4.0 International License. 168 1. Introduction Computer and Internet is an inevitable partner of now a day’s routine life and has been emerged as one of the largest platforms for e-commerce, file sharing and infotainment. Commencing by late 1960s, Internet has beheld a lot of progress as a network of WANs, MANs, LANs connected with different kinds of topologies, switches, routers and other devices, where each has different security structures, requirements and the levels of protection also varies indiscriminately. In nutshell, from a small-centralized structure, Internet has turned into a widely distributed yet decentralized architecture [1]. However, depending on the conduct of its users every discovery or investigation has positive and negative aspects.
    [Show full text]