Académique Documents
Professionnel Documents
Culture Documents
Volume: 3 Issue: 12 36 – 45
_______________________________________________________________________________________________
The Most Dangerous Cyber Security Threat Ransomware Prevention
Abstract: Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts
access to the infected computer system in some way,[1] and demands that the user pay a ransom to the malware operators to remove the
restriction. The cryptovirology form of the attack has ransomware systematically encrypt files on the system's hard drive, which becomes
difficult or impossible to decrypt without paying the ransom for the decryption key. Other attacks may simply lock the system and display
messages intended to coax the user into paying. Ransomware typically propagates as a Trojan, whose payload is disguised as a seemingly
legitimate file. This research will protect the system from this dangerous attack by making the operating system very strong.
__________________________________________________*****_________________________________________________
I. Introduction hid the files on the hard drive and encrypted their names,
This research is mainly abot one of the coon threat to and displayed a message claiming that the user's license to
cybersecurity threat called ―Ransomware‖ typically use a certain piece of software had expired. The user was
propagates as a Trojan, entering a system through, for required the user to pay US$189 to "PC Cyborg
example, a downloaded file or a vulnerability in a network Corporation" in order to obtain a repair tool. Popp was
service. The program then runs a payload, which typically declared mentally unfit to stand trial for his actions, but he
takes the form of a scareware program. Payloads may promised to donate the profits from the malware to fund
display a fake warning purportedly by an entity such as a AIDS research.
law enforcement agency, falsely claiming that the system The notion of using public key cryptography for such
has been used for illegal activities, contains content such as attacks was introduced in 1996 by Adam L. Young and Moti
pornography and "pirated" media, or runs a non-genuine Yung. Young and Yung showed that the AIDS Trojan was
version of Microsoft Windows. ineffective due to its use of symmetric cryptography, since
Some payloads consist simply of an application designed to the decryption key can be extracted from its code, and
lock or restrict the system until payment is made, typically implemented an experimental proof-of-concept cryptovirus
by setting the Windows Shell to itself,[11] or even modifying on a Macintosh SE/30 that used RSA and Tiny Encryption
the master boot record and/or partition table to prevent the Algorithm (TEA) to hybrid encrypt the victim's data. Young
operating system from booting until it is repaired. The most and Yung also proposed that electronic money could be
sophisticated payloads encrypt files, with many using strong extorted through encryption as well, so that "the virus writer
encryption to Payment is virtually always the goal, and the can effectively hold all of the money ransom until half of it
victim is coerced into paying for the ransomware to be is given to him".[13] They referred to these attacks as being
removed—which may or may not actually occur—either by "cryptoviral extortion", an overt attack that is part of a larger
supplying a program that can decrypt the files, or by sending class of attacks in a field called cryptovirology, which
an unlock code that undoes the payload's changes. A key encompasses both overt and covert attacks.
element in making ransomware work for the attacker is a
convenient payment system that is hard to trace. II. Literature Review
A range of such payment methods have been used, including Ransomware is a type of malware that prevents or limits
wire transfers, premium-rate text messages, pre-paid users from accessing their system, either by locking the
voucher services such as Paysafecard, and the digital system's screen or by locking the users' files unless a ransom
currencyBitcoin. A 2016 census commissioned by Citrix is paid. More modern ransomware families, collectively
revealed that larger business are holding bitcoin as categorized as crypto-ransomware, encrypt certain file types
contingency plans. on infected systems and forces users to pay the ransom
The first known ransomware was "AIDS" (also known as through certain online payment methods to get a decrypt
"PC Cyborg"), written in 1989 by Joseph Popp. Its payload key.
36
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 36 – 45
_______________________________________________________________________________________________
Ransom Prices and Payment to restart so the infection takes effect and displays the
Ransom prices vary depending on the ransomware variant notification (in Russian) once the system restarts.
and the price or exchange rates of digital currencies. Thanks
to the perceived anonymity offered by cryptocurrencies,
ransomware operators commonly specify ransom payments
in bitcoins. Recent ransomware variants have also listed
alternative payment options such as iTunes and Amazon gift
cards. It should be noted, however, that paying for the
ransom does not guarantee that users will get the decryption
key or unlock tool required to regain access to the infected
system orhostaged files.
RANSOM_JOKOZY.A 06 2016
Employs RSA 2048 asymmetric encryption
Known as CryptXXX
RANSOM_WALTRIX.C A .DLL file that is capable of locking screens 05 2016
Distributed by Angler Exploit Kit
RANSOM_MAKTUB.A Notable for its use of unique graphic designs for 03 2016
its ransom notes
40
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 36 – 45
_______________________________________________________________________________________________
41
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 36 – 45
_______________________________________________________________________________________________
Encrypts files and demands users to pay in bitcoin to
CRYPTCOIN CoinVault decrypt files; Offers a one-time free test to decrypt one file
Locks screen using a bogus display that warns the user that
they have violated federal law; Message further declares the
REVETON Police Ransom user's IP address has been identified by the Federal Bureau
of Investigation (FBI) as visiting websites that feature
42
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 36 – 45
_______________________________________________________________________________________________
illegal content
Ransomware
CRYPTOP archiver Downloads GULCRYPT and its components
CRYPDIRT Dirty Decrypt First seen in 2013 before the emergence of Cryptolocker
SYNOLOCK SynoLocker
Exploits Synology NAS devices' operating system (DSM
43
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 36 – 45
_______________________________________________________________________________________________
4.3-3810 or earlier) to encrypt files stored in that device;
has a customer support portal
CRYPDAP PadCrypt Has live chat support for affected users; Arrives via spam
44
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 36 – 45
_______________________________________________________________________________________________
Anti-Ransomware Tools and Solutions 8. Atlast we implement this method which is very
Trend Micro offers free tools such as the Trend Micro Lock strong enough to protect the system.
Screen Ransomware Tool, which is designed to detect and
remove screen-locker ransomware. The Trend Micro III. Conclusion:
Crypto-Ransomware File Decryptor Tool can decrypt files Ransomware is one of the cyber security threat which will
locked by certain variants of crypto-ransomware without attack the system by either encrypting or blocking the
paying the ransom or the use of the decryption key. system and demanding the user some money to decrypt
it.The solution is to find method which will not make the
Research Objectives and Approach attacker to attack the system , by making the operating
The main objective of the research is to find the better system soo strong and secured by using security algorithms.
solution to the problem by avoiding the attacker not to
attack the system. References:
There are Anti-Ransomware tools but these may or may not [1] Mehmood, Shafqat (3 May 2016). "Enterprise Survival
decrypt the files.This tools also take more time to decrypt Guide for Ransomware Attacks".SANS Information
because the attacker uses 1024 bit RSA algorithm to encrypt Security Training | Cyber Certifications | Research.
the system files. www.sans.org. Retrieved 3 May 2016.
The main approach of this research is to study about the [2] Dunn, John E. "Ransom Trojans spreading beyond Russian
heartland". TechWorld. Retrieved 10 March 2012.
attacker carefully how he is going to attack the system
[3] "New Internet scam: Ransomware...". FBI. 9 August 2012.
though we are having soo many security layers in the
[4] "Citadel malware continues to deliver Reveton
transmission system. ransomware...". Internet Crime Complaint Center (IC3). 30
Then how he is going to attack each and every layer of the November 2012.
network system so that we can stop him by making more [5] "Update: McAfee: Cyber criminals using Android malware
strong and secure layers. and ransomware the most".InfoWorld. Retrieved 16
If the attacker even attacks the system by attacking each and September 2013.
every layer, we will find one method in which he cannot [6] "Cryptolocker victims to get files back for free". BBC
encrypt the system files. News. 6 August 2014. Retrieved 18 August 2014.
[7] "FBI says crypto ransomware has raked in >$18 million
Then we select one security algorithm in such a way that
for cybercriminals". Ars Technica. Retrieved 25 June 2015.
the data stored on the system will be in the form of
[8] "Ransomware squeezes users with bogus Windows
encrypted data and when attacker tries to encrypt it further activation demand". Computerworld. Retrieved 9
cannot be possible. March 2012.
[9] "Police warn of extortion messages sent in their
Usefullness of Research: name". HelsinginSanomat. Retrieved 9 March 2012.
―Prevention is better than cure‖ ,This solution will avoid the [10] McMillian, Robert. "Alleged Ransomware Gang
hackers to attack the system because the previous solutions Investigated by Moscow Police". PC World. Retrieved 10
are only after the attacker attack the system but not before March 2012.
[11] "Ransomware: Fake Federal German Police (BKA) notice".
that.To protect the system from any type of hacking is the
SecureList (Kaspersky Lab). Retrieved 10 March 2012.
main goal of this research.
[12] "And Now, an MBR Ransomware". SecureList (Kaspersky
Lab). Retrieved 10 March2012.
Work Plan: [13] Young, A.; M. Yung (1996). Cryptovirology: extortion-
1. The first step is to study about the ransomware in based security threats and countermeasures. IEEE
depth. Symposium on Security and Privacy. pp. 129–
2. Then identifying how he is going to attack each and 140.doi:10.1109/SECPRI.1996.502676. ISBN 0-8186-
every layer of transmission system. 7417-2.
3. Which algorithm is used by him and what is the
key size.
4. Analyzing on which criteria he is choosing the
systems to attack.
5. Protecting each and every layer of the network
system , by using secure socket layer.
6. Inorder to transmit the data also we can also make
use of https rather than http protocol.
7. After this also we can make the operating system in
such a way that no one can access the files of it.
45
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________