In the face of rising Ransomware fears

In the face of rising Ransomware fears

The transition to a digital environment has made it easier for attackers to cause havoc online. The most effective method of infecting a computer today is malware. For instance, computer worms, ransomware, trojan horses, etc. But ransomware has taken the top spot for "trending." Multiple mutation-attack vectors are present in the software category known as ransomware. In this case, Attackers block all access to files and data using encryption techniques and demand a ransom in exchange for the key to their data. Currently, they have ruined several industries, including finance and healthcare.

Ransomware follows these steps:?

  • It gains access to the victim's computer and enters it. Then the attacker gradually infects it or introduces phases that, at first, the user won't notice, but later on the intensity worsens.
  • Keys for encryption and decryption are generated or obtained from the local computer.
  • The crucial duty performed by the attacker on the victim's PC is 'key management'. To demand whatever ransom the attacker wants in exchange for the victim's files or the keys to decode them, the attacker needs to retrieve the keys and keep them concealed or away from the victim after encrypting the victim's files. These keys are currently held with the attacker externally or locally, buried in various files.
  • The fourth most important phase is data encryption because this game depends on encrypted files or on keeping some of the user's data hidden. Now, there are two ways to accomplish this. Either all computer files are encrypted, or only those that are crucial to the victim and can be determined by monitoring the victim's online activities are encrypted.
  • The victims must be informed as the final step. They are informed that their files are encrypted, they no longer have access to them, and they will need keys to decrypt them. This is done via graphics or text that displays the ransom amount and a message.

Certain modules, such as the inbuilt Crypto module in the system, are used to restrict user access and administration rights and render data inaccessible to them. Since they exhibit diverse behavior, including polymorphic and metamorphic changes as well as code obfuscation, detection can be avoided.

Deep delve into attack technique:

The different attack vectors used for spreading infections are spam emails, social engineering, malicious scripts, and untrusted sources. According to recent research, these attack vectors can now operate without files, rendering them invisible to both dynamic and static malware detection. As for the encryption keys, that depends on the kind of encryption technique employed. The keys can be obtained from the local PCs or externally from the server. The keys are kept locally and can be retrieved there in the case of symmetric encryption. But in the case of asymmetric encryption, the private key needs to be retrieved from an external source. However, the public key is stored somewhere in the local computer itself.?

As for the data encrypted, it depends on analyzed patterns of data and file retrieval by the user. The attacker keeps a close eye on everything. After the analysis, the attacker takes action. The actions are classified as Crypto Ransomware and Locker ransomware.?

  • Crypto Ransomware: Using cryptographic techniques, the attacker encrypts all of the computer's important data files. Then, to recover access and authorization, he demands a ransom in exchange for the decryption key. Sending a message outlining the ransom and the procedure for regaining access will do this.
  • Locker Ransomware: The entire machine is locked by the Locker ransomware, rendering it worthless. The files are still locked and there are limits even after restarting. Privilege escalation techniques are used to accomplish all of this. The users are then shown a message explaining the situation and the ransom.

Most often, bitcoins or other cryptocurrencies are required as ransom payments. Initially, a few bytes of data is encrypted to prevent noticing the infected state of the machine. Later, the attackers notify the victim of the attack with a message, an image, access privileges being refused, or an abrupt change in the desktop background.

?Let's take a look at the most recent ransomware cases:

WANNACRY: In May 2017, computers worldwide were attacked with WannaCry ransomware. Its main target was window operating systems run by Microsoft. Single thread process and privileged escalation "DoublePulsar" were used to encrypt the files over computer systems. This happened with the help of an exploit developed by the US National Security Agency, called EternalBlue. A threatening message was sent to the victims along with the demand for Ransom in the form of Bitcoins.

SEFTAD: It is a type of Crypto-Ransomware that attacks the MBR and replaces it with an illegitimate one. Revere Engineering is used to unlock the hardcoded codes within the library. It blocks the boot system loading and displays the threat message and ransom.?

ONION: Researchers found a new variant of Ransomware known as Onion Ransomware. It uses the AES encryption method to encrypt the files and demand ransom from the victim in Bitcoins. It's known to crown over CryptoLocker soon.

Ransomware as a service: It provides ransomware codes as a service in exchange for a certain price. The price is way more than just money. This works on a shared basis where one of the members develops the ransomware and the other disseminates it. Darkside group has targeted high-revenue businesses and organizations in the 2020s which has resulted in data theft and encrypted files which were temporarily or permanently lost.??

Play Ransomware: It uses a new exploit chain developed by Crowdstrike to encrypt files. It targets the Exchange servers and executes remote code on vulnerable servers after triggers cause them to elevate privileges. Also, The message it displayed after getting access and injecting ransomware doesn't contain threatening messages or any information about the attack. Instead, they contain information about the attacker and the program's name.?

Conclusion:?

These are not all. There are many more; each with differentiating properties. Cyber attacks are increasing at an alarming rate. Ransomware is among the top threatening computer malware that has threatened computer users. Even after mitigating and tackling those attack vectors, the new variants are coming out strong. We need to be careful and keep a watch over any unusual activity in our systems. Take precautions. Know your System and Use antivirus software to detect and prevent any foreign activities.?

要查看或添加评论,请登录

DIGISAMAKSH的更多文章

社区洞察

其他会员也浏览了