Ransomware: A New Era of Digital Terrorism

  • Richa Indu Department of Computer Science and Engineering, Institue of Technology Roorkee
  • Anuj Sharma
Keywords: Ransomware, malwares, botnets, web crawlers

Abstract

This work entails the study of ten nasty ransomwares to reveal out the analytical similarities and differences among them, which will help in understanding the mindset of cyber crooks crawling over the dark net. It also reviews the traps used by ransomware for its distribution and side by side examining the new possibilities of its dispersal. It conclude by divulging inter-relationship between various distribution approaches adopted by ransomwares and some attentive measures to hinder the ransomware and supporting alertness as ultimate tool of defense at user’s hand.

References

A. H. Weis, “Commercialization of the Internet”, Internet Research 20 (4) 2010, 420-435.

G. Owen, N. Savage, “The Tor Dark Net”, Global Commission on Internet Governance Paper Series No.

, Sept 2015, 1-20.

F. Wehinger, “The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related

Services”, European Intelligence & Security Informatics Conference, IEEE Computer Society, 2011, 209-213.

A. Liska, T. Gallo, “Ransomware: Defending against digital extortion”, O’Reilly Media, November 2016,

ISBN: 9781491967881, 190 pages.

K. Cabaj, M. Gregorczyk, W. Mazurczyk, “Software-Defined Networking-based Crypto Ransomware

Detection Using HTTP Traffic Characteristics”, Computers & Electrical Engineering 66 (2018), 353-68.

S. I. Popoola, U. B. Iyekekpolo, S. O. Ojewande, F. O. Sweetwilliams, S. N. John, “Ransomware: Current

Trend, Challenges and Research Directions”, WCECS 1 (2017), 0958-66.

X. Luo, Q. Liao, “Awareness Education as the key to Ransomware prevention”, Information System

Security, 16(2007), 195-202.

K. Savage, P. Coogan, H. Lau, “The evolution of ransomware”, Symantec Security Response (2015).

B. Rajesh, Y.R.J. Reddy, B.D.K. Reddy, “A Survey Paper on Malicious Computer Worms”, IJARCST 3(2) 2015,

-167.

N. Milošević, “History of Malware”, Computer Security, 2014, 1-11.

https://arxiv.org/ftp/arxiv/papers/1302/1302.5392.pdf

M. Khari, C. Bajaj, “Detecting Computer Viruses”, IJARCET 3(7) 2014, 2357-64.

I. You, K. Yim, “Malware Obfuscation Technique: A brief Survey”, International Conference on Broadband,

Wireless Computing, Communication and Application”, IEEE 2010, 297-300.

H. U. Salvi, R.V. Kerkar, “Ransomware: A Cyber Extortion”, Asian Journal of Convergence in Technology

(3), 2016.

A. Gazet, “Comparative Analysis of Ransomware Virii”, J. Computer Virology, 6(2010), 77-90

P.B. Pathak, “A Dangerous Trend of Cybercrime: Ransomware Growing Challenge”, IJARCET 5(2), (2016),

-373.

S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”, Whitepaper 2008, bitcoin.org

C. Telly, “A Coin for the Tsar: The Two Disruptive Sides of Cryptocurrency”, Small Wars Journal, Jan 15,

http://smallwarsjournal.com/jrnl/art/coin-tsar-two-disruptive-sides-cryptocurrency/

D. Stroukal, B. Nedvedova, “Bitcoin and Other Cryptocurrency as an Instrument of Crime in Cyberspace”,

th Business and Management Conference (Istanbul), Oct 12, 2016, 219-226.

G. F. Hurlburt, I. Bojanova, “Bitcoin: Benefit or Curse?”, IT Trends (IEEE), 2014, 10-15.

K. Hegadekatti, “Regulating the Deep Web Through Controlled Blockchains and Cryptocurrency

Networks”, SSRN, 2016, 1-10.

M. Rutnik, “What is Cryptocurrency?”, Feature: Android Authority (Online), Feb 25, 2018.

https://www.androidauthority.com/what-is-cryptocurrency-805162/

“Rupee vs dollar: From 1990 to 2013”, Business (Rediff.com), Jun 12, 2013.

http://www.rediff.com/money/slide-show/slide-show-1-rupee-vs-dollar-from-1990-to2013/20130612.htm

B. Lokuketagoda, M. Weerakoon, U. Madhushan, A.N. Senaratne, K.Y. Abeywardena, “R-Killer: An Email

Based Ransomware Protection Tool”, World Academy of Science, Engineering and Technology, International

Journal of Computer and Information Engineering 12 (2), 2018, 200-206.

J. Huang, J. Xu, X. Xing, P. Liu, M. K. Qureshi, “FlashGuard: Leveraging Intrinsic Flash Properties to Defend

Against Encryption Ransomware”, Proceedings of the ACM SIGSAC Conference on Computer and

Communications Security (2017), 2231- 44.

L. Invernizzi, P.M. Comparetti, “EVILSEED: A Guided Approach to Finding Malicious Web Pages”, IEEE

Symposium on Security and Privacy 2012, 428-442.

https://www.cryptodrop.org/how-it-works.php

P. Muncaster, “CryptoDrop Tool Spots and Stops Ransomware in its Tracks”, News: InfoSecurity

Magazine, Jul 14, 2016. https://www.infosecurity-magazine.com/news/cryptodrop-spots-stopsransomware/

N. Scaife, H. Carter, P. Traynor, K.R.B. Butler, “CryptoLock (and Drop It): Stopping Ransomware Attacks

on User Data”, IEEE 36th International Conference on Distributed Computing Systems”, 2016, 303-12.

A. Kharraz, E. Kirda, “Redemption: Real-time Protection Against Ransomware at End-Hosts” International

Symposium on Research in Attacks, Intrusions, and Defenses (2017), 98-119.

N. Hachem, Y.B. Mustapha, G.G. Granadillo, H. Debar, “Botnets: Lifecycle and Taxonomy”, Conference

on Network and Information Systems Security (SAR-SSI) IEEE, 2011, 1-8.

B. Thuraisingham, L. Khan, M.M. Masud, K. W. Hamlen, “Data Mining for Security Applications”, IEEE/IFIP

International Conference on Embedded and Ubiquitous Computing (2008), 585-89.

A. Bhardwaj, V. Avasthi, H. Sastry, G.V.B. Subrahmanyam, “Ransomware Digital Extortion: A Rising New

Age Threat”, IJST 9(14), April 2016, 1-5.

P. Mahajan & A. Sachdeva “A Study of Encryption Algorithms AES, DES and RSA for Security”, Global

Journal of Computer Science and Technology 13 (15) 2013, 15-22.

A. A. Hasib, A.A.M.M. Haque, “A Comparative Study of the Performance and Security Issues of AES and

RSA Cryptography” 3rd International Conference on Convergence and Hybrid Information Technology

(2008) IEEE, 505- 510.

Exabeam, “The Anatomy of a Ransomware Attack”, White Paper (Threat Research Report) 2016, 1-13.

R. Leong, “Understanding Ransomware and Strategies to Defeat it”, White Paper (McAfee Labs), 1-16.

F-Secure, “Ransomware: How to predict, prevent, detect & respond”, White Paper (Threat Response),

Nov 2016,1-11.

S.S. Ganorkar, K. Kandasamy, “Understanding and Defending Crypto-Ransomware”, ARPN Journal of

Engineering and Applied Sciences 12 (12) 2017, 3920-25.

Deloitte, “Ransomware Holding Your Data Hostage”, Threat Study, Aug 12, 2016, 1-23.

M. Fimin, “Are employees part of the ransomware problem?”, Computer Fraud & Security, Aug 2017,

-17.

Published
2018-08-29
Section
Research Articles