Presentation On Analysis of Ransomware Attacks
Presentation On Analysis of Ransomware Attacks
ATTACKS
CA K MANIKANDAN
M.No 254418
Warning
Introduction:
Since ages attacks against another happened for many reason, where people
used many kind of weapons.
Since development weapons of mass destruction stopped at the level of
nuclear and bio war, where need of new generation weapon required, which
will not take human lives and don’t create border issues.
People with bad Intensions murdered people and taken their livelihood, over
the time period they become mercenaries. And after a period instead of
killing they came knew that killing duck which lay golden egg won’t be a good
idea
Over the period certain types of crimes became impossible or wont worth
doing by risking the life like ‘abduction, assassination, blackmail, burglary,
embezzlement, espionage, hijacking, identity theft, mugging, robbery,
shoplifting, smuggling, terrorism trafficking, treason, vandalism, voyeurism’,
to give counter to all this internet attacks emerged in the this new computer
era like Malware, Phishing, DOS, SQL injection, Zero-day exploit, Drive-by
Attack, Password Attack, Eavesdropping.
On that one of the recent biggest threat in the Virtual computer era is
ransomware attacks,
During 1996 concept called Crypto-virology and cryptoviruses were introduced
which shows that cryptography can be used for offensive purposes, such as
extortion which was later evolves as crypto-ransomware.
Every day, we create roughly 2.5 quintillion bytes of data. With the growing
popularity of IoT (Internet of Things), this data creation rate will become
even greater. Protection these data falls on each individuals.
These new generation attacks used to obtain money, espionage, stop the
service provider, blocking general public utility, gaining access to confidential
information, revealing movie scripts, future strategic plans of organisation
Malicious Program
Locker
Crypto Scareware
Attack process
In general, ransomware attack is launched in three Phases i.e., pre-encryption, encryption, and post-encryption.
Ransomware attacks follow a specific pattern that can be observed variants of ransomware. Attack process consists
finding the target, distributing infection virus or malware and installing the same, after that it targets files, encrypting
them by creating private keys, after the intruder ask for ransom via text message like one in the cover page
Devices being attacked
In the Virtural era not only PC all the IOT devices like
Wearables
Smart tv
Mobiles devices
Fog layer
Fog layer
Cloud-based systems
Red Flags
There are action can be used as red flag and also some behaviours patterns
shows the occurrence of a ransomware attack. They are
Opening of many files
Structure of input and out streams
Many write/overwrite operations
A process calling encryption APIs
Frequent reading and rewriting/deleting requests in a short period of time
Communication with command-and-control server
Change in the user registry keys
IDENTIFICATION OF RANSOMWARE AND MALWARE ANALYSIS
Signature
Hybrid based
Detection Detection
Approaches Approaches
Behavioural
based Detection
Approaches
File Analysis
Crypto ransomware modifies a file when encrypting it. Large changes made to
many files in a computers file system that could indicate that a ransomware
attack is underway. There are several metrics that can be used to detect
significant changes in files. These four methods of file analysis are defined
below.
File
File type
entropy
DGA
Packet size
detection
Malicious Message
domains frequency
Other
features:
Machine Learning
Log files
File I/O
HPC values
Opcode/Bytecode sequences
Process actions
Others
Limitation in Detection of ransomware
Most of the conducted research for the ransomware detection fall under conventional class where
ransomware is detected after the encryption starts
High number of irrelevant and redundant system calls used to bypass the detection
Developed ransomware studies used different number of logs from different ransomware families.
The ransomware detection systems are platform dependent. A system developed for windows API cannot be
implemented for cloud and mobile devices.
Ransomware detection research cannot detect the ransomware which encrypt data using its own native code.
Not all the detection research available in the literature are practical to implement. Some of the presented
studies are empirical or supplement detection systems.
Honeypot aka Decoy methods are not fully reliable as there is no guarantee the honeypot folders will always
be accessed by the attack.
Analyzing the samples for limited or ample time made the detection researches inadequate to implement.
Dealing with little amount of data or massive data with high redundant values.
Some of the studies did not explain well about the analysis performed for the detection
Unawareness among users
Lack of Open-Access Ransomware Libraries
Prevention
This system was able to hold original data by using the garbage collector. This
system performed detection by using the frequent read and rewrite requests
on the storage devices. Which is why it is called Self Defensible SSD
Conclusion