Documente Academic
Documente Profesional
Documente Cultură
Information Security
PROJECT
Ransomware
Project Team
Student Name Student ID Program
Hamza Rahman BSCM-F16-140 BSCS
Mishal Zareen BSCM-F16-132 BSCS
Project Supervisor:
Mam Faiqa
Introduction
The God has created whole universe and his best creation is mankind. When he
created first man he put some of his good characteristics in him, and give him the
biggest weapon brain but where this weapon brings good to mankind it also bring harms
to himself, This is the circle if YIN and YAN, Since the creation of mankind the biggest
threat to mankind is the greed. He wants to take everything what others have.
Never in the history of humanity, people all over the world subject to exaction on a huge
scale as they are today. In the recent years, the usage of PCs and the Internet has
exploded and, along with this huge increase, cyber crooks have come to feed this souk,
aiming acquitted consumers with a wide range of per ware. Most of these threats are
meant unswervingly or meanderingly in receiving currency from victims.
Since the 50s, the world has seen the merits and the wonders of the Internet and World
Wide Web (WWW). Every user today is now being connected to it at an immensely
quick pace. The amount of data is now exceeding zettabytes (2^70 bytes) since last
year, and the concerns for its safety are now taking the shape of a
major problem.Pernicious content and corrupt programs have been attacking andinfecti
ng various devices around the world, and the efforts for their prevention and
eradication have also gained pace simultaneously
While each ransomware variant has their own way of spreading, all ransomware
variants rely on similar social engineering tactics to deceive users and hold their data
hostage. Let’s look at the different types of ransomware variants:
Technique:
Crypto Locker
WannaCry
Bad Rabbit
Cerber
Crysis
CryptoWall
GoldenEye
Jigsaw
Locky
Ransomware Statics
Comparison:
Crypto Locker
Crypto Locker botnet is one of the oldest forms of cyber attacks which has been
around for the past two decades. The Crypto Locker ransomware came into
existence in 2013 when hackers used the original Crypto Locker botnet approach
in ransomware. Crypto Locker ransomware is the most destructive form of
ransomware since it uses strong encryption algorithms. It is often impossible to
decrypt (restore) the Crypto ransomware-infected computer and files without
paying the ransom
WannaCry
WannaCry is the most widely known ransomware variant across the globe. The
WannaCry ransomware has infected nearly 125,000 organizations in over 150
countries. Some of the alternative names given to the WannaCry ransomware
are WCry or WanaCrypt0r.
Bad Rabbit
Cerber
Crysis
GoldenEye
Jigsaw
Jigsaw is one of the most destructive types of ransomware which encrypts and
progressively deletes the encrypted files until a ransom is paid. It starts deleting
the files one after the other on an hourly basis until the 72-hour mark- when all
the remaining files are deleted.
Locky
When a user opens the email attachment, the invoice gets deleted automatically,
and the victim is directed to enable macros to read the document. When the
victim enables macros, Locky begins encrypting multiple file types using AES
encryption.
References:
[1] Richardson, Ronny and North, Max M., "Ransomware: Evolution, Mitigation and
Prevention" (2017). Faculty Publications. 4276.
https://digitalcommons.kennesaw.edu/facpubs/4276.
[4] CryptoWall
https://www.enigmasoftware.com/cryptowallransomware-removal/
http://red.pe.org.pl/articles/2015/11/48.pdf
[5]
Ransomware, Threat and Detection Techniques: A Review SH
† † †
Kok , Azween Abdullah , NZ Jhanjhi and Mahadevan
††
Supramaniam
http://paper.ijcsns.org/07_book/201902/20190217.pdf