
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 5 Issue 2, February 2016 A Dangerous Trend of Cybercrime: Ransomware Growing Challenge Dr.P.B.Pathak Assistant Professor & Head, Department of Computer Science & Information Technology Yeshwant Mahavidyalaya Nanded Maharashtra, India computer or device, preventing victims from using it. Locker Abstract— Recently computers are used massively due to Ransomware use payment vouchers and Crypto Ransomware advent of the internet and technology, so as cybercriminals also use it’s Bitcoins for payment. Ransomware is considered a emerged to target innocent users to make money from the Scareware as it scares users to pay a fee or ransom. Paying for victims. People across the globe are subjected to extortion on a very large scale. Ransomware is modern and technology the ransom does not guarantee that users can eventually be enabled way of extortion. Ransomware stops you from using able to access the infected system.[11] your system or device and holds your system/device or files for ransom. The present research paper discusses Ransomware all Users may witness Ransomware threat through a variety of round i.e. What is it? What are various forms of it? How it ways. Ransomware can be downloaded by unaware users by works? How to prevent it? visiting malicious or compromised websites. It can also arrive as a either dropped or downloaded payload by other Index Terms—Bitcoin, CryptoLocker, Cybercrime, Malware, Ransomware malware. It may arrive as an attachment to a spammed email. Cybercriminals behind Ransomware are ever innovative. Ransomware attacks often use tactics like entrusting I. INTRODUCTION pornography on your screen to demand you pay a ransom to Ransomware is a kind of malware that attempts to extort remove the pornography.[2] money from a computer user by infecting and taking control of the victim’s machine, or the files or documents stored on II. RANSOMWARE AND TYPES it. Generally, the Ransomware either locks the computer to These Ransomware systematically progressed and prevent normal usage, or encrypts the documents and files on improved with the technological advances and widespread it to prevent access to the documents and files. The ransom use of Internet, to make it more scary and powerful over the demand is displayed, usually either via a text file or as a years. [3,13] webpage in the web browser. This type of malware exploits FAKEAV malware forces users to purchase their the victim's embarrassment or fear to force them pay the bogus antimalware software by showing fake ransom demanded. Ransomware may arrive as part of antimalware scanning results. another malware's payload, or may be delivered by an exploit A Ransomware zip’s certain type of files usually kit to exploit vulnerabilities on the affected computer and it .DOC, .XL, .DLL, .EXE and overwrites these, silently installs and executes the malware.[1] keeping only the password protected zip files in the user’s system along with a ransom note in the Ransomware is a way of direct and large scale revenue notepad. generation using Crypto Ransomware and Locker SMS Ransomware asks to call a premium SMS Ransomware. Crypto Ransomware encrypts personal data number and also displays a Ransomware page and files on computer and Locker Ransomware locks the continuously to users as long as they do not pay the ransom. Manuscript received Feb, 2016. A Ransomware targets Master Boot Record of a Dr.P.B.Pathak, Assistant Professor & Head, vulnerable system to prevent the operating system Department of Computer Science & Information Technology Yeshwant Mahavidyalaya Nanded,Maharashtra, India from loading and displays its ransom notification. Reveton or Police Ransomware impersonates local ISSN: 2278 – 1323 All Rights Reserved © 2016 IJARCET 371 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 5 Issue 2, February 2016 police by showing a notification page, informing This typically locks the computer’s or device’s user interface them that they were caught doing an illegal or and then asks the user to pay a fee to restore access to it. malicious activity online. Reveton employ different Locked computers will remains with limited capabilities. payment methods. Locker Ransomware leaves the underlying system and files Some Ransomware play an audio recording using the untouched meaning that the malware can potentially be victim’s native language and some bears a fake removed to restore a computer to original state. This dims digital certificate. effectiveness of locker Ransomware at extracting ransom CryptoLocker Ransomware encrypts files, rather than payments compared with its more destructive variants of locking the system to ensure that users will pay Crypto Ransomware. This type of Ransomware often though the malware is deleted. The spammed impersonate as police authorities and claims to issue fines to message contain malicious attachment, users for alleged online imprudence or criminal activities.[5] downloading attachment downloads the CryptoLocker malware. Crypto Ransomware finds and encrypts valuable data stored CryptoDefense or Cryptorbit, malware demands on the computer, making the data useless unless the user payment for its decryption services. This can easily obtains the decryption key. The developers of Crypto spread compared to other via removable drives Ransomware know that data on computers is very important eliminating need of relying on downloader malware to users and they may be desperate to get their data back, to infect systems. This malware not only encrypts preferring to pay the ransom to restore access and avoid database, web, Office, video, images, scripts, text, painful consequences. Crypto Ransomware unnoticeably and other non binary files but also deletes backup searches for files and encrypts them. Its goal is to stay files to prevent restoration of encrypted files. [9,12] unnoticed until it can find and encrypt all of the files that BitCrypt is more refined Ransomware incorporate could be important and valuable to the user. By this time the Cryptocurrency e.g., Bitcoin theft with two variants victim receives the malware’s message that that their data is first uses an English ransom note and the second encrypted. With Crypto Ransomware infections, mostly the uses a multilingual ransom note. affected computer continues to work normally, and users can CRIBIT malware also extorts in the form of Bitcoins still use the computer apart from accessing encrypted data. for unlocking files. [9] FAREIT variant, information stealing malware can steal information from various Cryptocurrency Police themed Ransomware cleverly present their ransom wallets containing important information like demands as official looking warning messages from a local transaction records, user preferences, and accounts. police. Ransom message claim that the user's computer is CryptoLocker variant Ransomware abuse Windows locked after the police identified it as being used to visit PowerShell feature to encrypt files to make threats illegal websites related to terrorism or abuse and that undetected on the system and/or network. payment of a fine is required to settle the offense and A police Ransomware infects a known critical file, directions for paying it via anonymous, untraceable user32.DLL and locks the screen of the infected disposable cash cards. TorrentLocker and CryptoWall computer thereby prevents detection by behavioral malware variants are difficult to beat and grow their monitoring tool. The infected user32.DLL will disjointed criminal activity into coordinated, improved begin a chain of routines that ends with the stealth and effective business operations. Ransomware attack Ransomware being loaded, locking the computer’s methods advanced in techniques and increased in profit in screen and projecting a ransom image messages. past few years. The social engineering has increased [10] infection rates considerably. [15] Critroni or Curve-Tor-Bitcoin (CTB) Locker Ransomware uses the Tor network to mask its C&C TorrentLocker, is successful due to its targeted campaigns. communications, asks for Bitcoins as ransom. CTB The infection chain involves a three step process: Locker variant TorrentLocker Ransomware adds URL Redirection, CAPTCHA code and redirection to a spoofed site. Getting on Malicious Page, Crowti or Cryptowall, and FakeBsod are CAPTCHA code Verification. Ransomware families. FakeBsod uses a malicious Attackers compromise web servers and redirect the URL, piece of JavaScript code to lock your web browser eventually victim gets on page controlled by cybercriminal, and show a fake warning message when you visit and victim is required to complete simple CAPTCHA code infected or malicious webpage. The warning verification test. Immediately after entering the CAPTCHA, message tells you to call the phone number in the the TorrentLocker malware is extracted and executes its message and you will be asked to pay money to fix commands to encrypt files. CryptoWall has been used to the issue.[4,14] exploit unsuspecting businesses. The timing and design of socially engineered attack keeps recipients clueless to III. HOW RANSOMWARE WORKS understand that they are attacked. The CryptoWall 3.0 uses Locker Ransomware denies access to computing resources. AES algorithms to encrypt files and an RSA to encrypt the ISSN: 2278 – 1323 All Rights Reserved © 2016 IJARCET 372 International Journal of Advanced Research in Computer Engineering
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages3 Page
-
File Size-