Ransomware Attacks: - Impact, Symptoms, Working, Preventive Measures and Response

Ransomware Attacks: - Impact, Symptoms, Working, Preventive Measures and Response

International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-6, August 2020 Ransomware Attacks: - Impact, Symptoms, Working, Preventive Measures and Response Anant Gangwar There are mainly three types of ransomware: Abstract: Ransomware is the malware that breaches the . Scareware: You’re likely to be bombarded with pop-ups protection of the system by using malicious codes. Modern claiming that the system got infected with malware, but your ransomware families, encrypt certain file types on compromised files are safe. E.g. AdwarePunisher, Total Secure 2009, and systems. The attacks not only focused on a particular individual, XP Antivirus 2009. but many organizations and institutions are also involved. New threats to the education sectors and similar organizations are . Screen Locker: When you start up your computer, a full centered here. Possible identification, prevention methods & screen window appears displaying a message that your responses to the rising ransomware attacks explained to combat computer is locked by the FBI or US Department of Justice them efficiently. The main ground of this research is to identify & saying that an unlawful activity is detected on your computer. understand the working of encrypting ransomware and And ask for a fine. The FBI never does such screen locking. understand the potential ways to counter them before attacking our systems & networks. Following the methodologies presented E.g. Police scam, FBI Money-Pak scam. in this paper with careful analysis can effectively prevent and . Encrypting Ransomware: It seizes up your files and avert ransomware attacks. encrypts the data, asking ransom to decrypt. This one is very dangerous and commonly used by the attackers these days. Keywords: Anti-Ransomware, Prevention and Response, Ransomware, Ransom-Cloud, Threats to Education Sector, Cyber When the attackers get control over your data & system, safety. there’s nothing that can help you restore your files unless you pay the ransom. And still, if you do pay up, there’s no I. INTRODUCTION guarantee of getting your files decrypted. [2] E.g. Crypto-Locker, WannaCry, Bad Rabbit, Jigsaw, Petya, During the pandemic, ransomware attacks have increased Locker-Goga. significantly. Recently there are many cases of companies, II. HOW DOES A COMPUTER OR DATA GET organizations, and authorities like NHAI, US Newspaper ATTACKED BY RANSOMWARE? company, Mac hit by the ransomware attacks. New ransomware - Maze (attacked NHAI), WastedLocker (US Mostly its spread through phishing emails having malicious Newspaper Company), Try2Cry (infects USB drives), attachments or by downloading from drive links. Drive-by Avaddon (using Excel Macro 4.0), ThiefQuest & EvilQuest downloading happens when a user unknowingly hits an (for Mac). infected website and the malware gets installed. It has also spread through social media, web-based instant messaging A. What is ransomware? applications, vulnerable web servers have been misused as an Ransomware is a malware that gets installed silently on a entry point to gain access to an organization’s network. victim’s computer or cloud then it performs a crypto virology Out-dated technology infrastructure, Wi-Fi routers with attack that sceptically affects the system, and demands a default passwords, not checking the authenticity of the emails, ransom to decrypt it. Old type ransomware is not difficult for unconfigured firewall are some of the reasons for your system an experienced person to reverse & decrypt. More advanced to be infected. Other types of social engineering attacks like malware encrypts the victim’s data files, which could be on a Spear phishing, Whaling, Smishing (SMS phishing), Vishing system or the data of cloud & cloud email boxes (known as (voice phishing), Pharming (DNS based phishing - involves Ransom-Cloud), making them inaccessible, and demands a the alteration of a system’s host files or domain name system), ransom mostly in bitcoins to decrypt them. [1] It causes the Content-Injection Phishing (inserting malicious code or loss of important data, intellectual property theft, and misleading content into the real websites), Man-in-the-middle defamation. With industries, it can cause a data breach or, the Phishing. attacker may threaten to expose the most valuable data on publicly available websites. Ransom-Cloud works by sending A. Impact an email that assures your cloud anti-spam service. When you . Significant loss of confidential data. click on the email to install the service, it will deliver a . Interruption to the normal working of the systems. ransomware payload that encrypts all the emails and . Financial costs in restoring data & ransom. attachments. Possible harm to organization reliability. Revised Manuscript Received on July 20, 2020. Anant Gangwar, Gurugram Police Cyber Security Summer Internship, Gurugram, Haryana, India. E-mail: [email protected] Published By: Retrieval Number: F1336089620/2020©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijeat.F1336.089620 188 and Sciences Publication Ransomware Attacks: - Impact, Symptoms, Working, Preventive Measures and Response . Probably an entire cessation of organization progress. recovery. It displays a warning message on the desktop of the victim, asymmetric cipher and instructions to transfer the B. Symptoms money. The asymmetric ciphertext along with the ransom has . If you find your system function slower than the usual to be transferred to the attacker by the victim. speed, then do check if there’s any Trojan running in the 3. Attacker → Victim: The attacker converts back the background spying your sensitive data or sending to a remote asymmetric ciphertext with his private key to the original text server. [3] after receiving the ransom and sends the symmetric key to the . Usually, Trojans are installed in the systems to steal victim. The victim then decrypts the encrypted files using that sensitive data before encrypting the whole data of the victim key. with malware. After collecting the data, the Trojans then download malware from the remote server or run the B. Source Codes pre-downloaded malware (crypto-ransomware) in the system . WannaCry– of the victim. https://github.com/ytisf/theZoo/tree/master/malwares/Binarie . You are not able to open files. Errors like corrupted files or s/Ransomware.WannaCry the wrong extension will start displaying. GonnaCry– . An alarming message with a countdown will be displayed https://github.com/tarcisio-marinho/GonnaCry on your desktop with the instructions for the ransom payment . CryptoLocker– https://rb.gy/yyjdic & file decryption. Locky– . There will be files with the names like HOW TO https://github.com/ytisf/theZoo/tree/master/malwares/Binarie DECRYPT FILES.TXT or DECRYPT s/Ransomware.Locky INSTRUCTIONS.HTML. [4] . WinLock– https://github.com/mauri870/ransomware . Petya– III. WORKING OF RANSOMWARE https://github.com/ytisf/theZoo/tree/master/malwares/Binarie s/Ransomware.Petya . Jigsaw– https://github.com/LeechxSys/Jigsawsource C. Examples 1) WannaCry Ransomware (Biggest Ransomware Attack) It was May 2017 global cyberattack by the WannaCry cryptoworm, which targeted machines running the Microsoft Windows operating system by exploiting the severe Windows Fig 1. Flow of Infection (Source: CISA Ransomware) SMB vulnerability, then encrypting data and demanding ransom in the Bitcoin cryptocurrency. Three files presented 1. Ransomware could be Single-threaded / Multi-threaded. for analysis. The first file was a dropper, which was (encrypts one/multiple document/s at a time) responsible for holding & delivering the ransomware via 2. It creates the encrypted copy of the files in the smaller MS17-010/EternalBlue SMBv1.0 exploit. The remaining two chunks in a free available disk to prevent data recovery from files were ransomware segments containing encrypted the disk; it could encrypt the entire/partial document. plug-ins liable for encrypting the victim user’s data. [6] 3. Renames the files and changes their extensions. YARA signatures to detect the ransomware: 4. Elevates privileges to SYSTEM by exploiting available vulnerabilities in the older or newer versions of the https://www.us-cert.gov/ncas/alerts/TA17-132A system/services. And disable Windows Startup Repair. 5. Some ransomware moves the original files to the %temp% 2) Ryuk Ransomware folder. A separate application TASKDL.EXE deletes the It was a worldwide attack which appeared in August 2018. A scrambled originals in the %temp% folder after all documents revised version and having similar properties as of Hermes are encrypted. [5] Ransomware, named as Ryuk. This ransomware was focused and has compromised enterprises only. Its main 6. Deletes volume shadow copies via VSSADMIN.EXE, characteristics - Multi-threaded and encrypts the data after the documents are encrypted. available on the mapped network drives. It used to append the 7. Changes the desktop wallpaper. Key Binary Large Object (also known as Key BLOB) at the A. Three-Round Protocol tail of the encrypted document. In this ransomware, two trojans Emotet & TrickBot work together also known banking Steps of three-round protocol of Encrypting Ransomware trojans as they can easily escape signature detections by (between the attacker and the victim): Antiviruses. Emotet's work is to download the malware & 1. The attacker creates a key pair and Attacker → Victim: other trojans. Files with exe, dll, or hrmlog extensions not places the corresponding public key in the malware. The encrypted by Ryuk.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us