Ransomware Attack COMP SCI. Seminar

TABLE OF CONTENT

Dedication……………………………………………………………………………………..i
Acknowledgement…………………………………………………………………………….ii
Table of Content………………………………………………………………………………iii
Abstract……………………………………………………………………………………….v

CHAPTER ONE
1.1 INTRODUCTION

 Aims and Objectives…………………………………………………………………………1.2
1.3 Justification for the seminar…………………………………………………………………1.3
1.4 Scope of the seminar………………………………………………………………………1.4
CHAPTER TWO
2.1  LITERATURE REVIEW………………………………………………………………2.1
CHAPTER THREE
3.1 Purpose of seminar……………………………………………………….…….………..3.1
3.2  Methodology………………….………………………………………………….……..3.2
3.3  Ransomeware concept…………………………………………..………………………3.3
CHAPTER FOUR
4.1Media Transport…………………………………………………….…………………..4.1

4.2 Inter Stream Synchronization…………………………………………….…………….4.2
4.3Conferencing Support……………………………………………………………………4.3
CHAPTER FIVE
5.1 Conclusion……………………………………………………………………………..5.1

5.2 Summary……………………………………………………………………………….5.2                                                                                                                                                                         

                                                                                     iii                                                                                                                                                                                         

ABSTRACT

Ransomware is type of malware that are designed to extort money from a victim. Ransomware can attack on different platform like windows, android etc. It can attack systems in two ways, either can encrypt data or can block information. If virus is activated on system it can enable to spy on your system to delete, block or encrypt data until a ransom is paid. The first ransomware, known as PC Cyborg or AIDS, was created in the late 1980s. PC Cyborg would encrypt all files in the C: directory after 90 reboots, and then demand the user renew their license by sending $189 by mail to PC Cyborg Corp.

Ransom attacks can be prevented by paying closer attention to application permission request and by using prevention techniques. Prevention techniques can help detect and remove Ransomware without obtaining information about Ransomware.

The focus of the paper is on ransomware attacks on past attacks. and one of the most popular operating system of the attack is android.

Ransomware attackers can be prevented by monitoring abnormal file system and in android it can be detected by paying close attention to the android manifest file. Ransomware has received considerable news coverage in recent years, in part due to several attacks against high-profile corporate targets.

CHAPTER ONE

INTRODUCTION

The risk and severity of cyber-attacks have clearly grown over the past few years. In fact, mankind has witnessed the most horrific cases of cybercrimes related to massive data breachesflaws in microchipscryptojacking, and many others. 

It goes without saying that the advancement of technology and the wide use of digital media is making attackers smarter by the day. Further, these cybercriminals take advantage of individuals and firms who pay less heed to cybersecurity. They target everything from a newly-launched blog to an established online store to gain access to sensitive information.

Ransomware is one of the biggest security problems on the internet and one of the biggest forms of cybercrime that organizations face today. Ransomware is a form of malicious software – malware – that encrypts files and documents on anything from a single PC all the way up to an entire network, including servers. Victims can often be left with few choices; they can either regain access to their encrypted network by paying a ransom to the criminals behind the ransomware, or restore from backups or hope that there is a decryption key freely available.

Social engineering attacks like phishing have always been used by attackers to trick victims into surrendering sensitive information like login details and credit card information. Though most organizations are enhancing their email security to block phishing attacks, cybercriminals are coming up with sophisticated phishing kits that aid in data breaches and financial fraud.  

What is Ransomware?

 Ransomware is particularly pernicious form of malware that restricts an individual’s access to their computer (e.g., by encrypting their data) and demands payment to restore functionality. Ransomware typically operates via the crypto virology mechanism, using symmetric as well as asymmetric encryption to prevent users from performing managed file transfer or accessing particular files or directories.

Ransomware is a type of Trojan. This virus  often disguised as legitimate software. Once the virus is activated on victim system it can enable to spy on victim systems. Ransom can delete, modifying, copying and disrupting data on victim’s system. Ransom can attack on different platform like windows, android, Linux, mac etc. While the first documented ransomware attack dates back to 1989, ransomware remained relatively uncommon until the mid-2000s. Since then, the attack has been automated and professionalized. It is believed to be highly lucrative, with previous damages estimated at hundreds of millions of dollars per year. By a single ransomware variant, CryptoWall3, were estimated to be over $320 million in 2015 alone [1]. Consumers are thought to be the most common victims of ransomware [5, 7]. While most attacks are thought to be untargeted, consumers are often less likely to have robust security in place, increasing the likelihood of falling victim to an attack [7]. Despite the harm ransomware can inflict, relatively little is known about the prevalence and characteristics of such attacks in the general population. Reliable estimates of the prevalence of ransomware are necessary both for understanding the nature of today’s threat landscape, as well as for longer-term comparison and analysis. Various government, industry organizations, and researchers have attempted to document the phenomenon, but results have been often inconsistent. This is in large part due to the non-representative data they are based on. Industry reports are typically published by security firms and are based on users of their software products. Such samples are thus inevitably biased towards a set of consumers who have sufficient security awareness and the financial resources to purchase such products. Their experiences may thus not reflect those of the general population. In contrast, government agencies typically report rates based on voluntary victim reports. These estimates are thought to grossly underestimate the true rate [33]. For example, the U.S. Department of Justice estimates that only 15 percent of the nation’s fraud victims report their crimes to law enforcement [2], however it is unclear what the true rate of reporting is in the general population. Apart from the difficulty in characterizing the extent of the problem, little is known about the factors and behavioral patterns that place individuals at risk of such attacks. Devising accurate risk assessment methods to identify the vulnerable population is particularly relevant for ransomware attacks, as infection may impose an especially high cost to consumers.

Leave a Reply

Your email address will not be published.

error: Content is protected !!