Ransomware: The Evolution of a Cybercrime

Authors

  • Md Rifat Ahmed Faculty of Computing, Engineering & Technology, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia Author
  • Julia Juremi Faculty of Computing, Engineering & Technology, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia. Author
  • Jazrin Ramli Faculty of Computing, Engineering & Technology, Asia Pacific University of Technology & Innovation, Kuala Lumpur, Malaysia Author

DOI:

https://doi.org/10.61841/b8jeza83

Keywords:

Ransomware, Malware, Trojan, Kill Chain, Wanna Cry, Petya, C2.

Abstract

Ransomware is a growing threat that encrypts and locks user's files and holds the decryption key until a ransom is settled by the target. This type of malware is responsible for tens of millions of dollars in extortion annually. Worse still, developing new variants is trivial, facilitating the evasion of many antivirus and intrusion detection systems. This paper discusses the evolution of ransomware, which involves types of both computer and mobile device ransomware. The scam has evolved over time, using various techniques to disable the target device. We have identified at least ten different versions of ransomware. In fact, there is not just one single family of ransomware composed of multiple variants, but rather multiple families, each with their own unique behavior. This paper also provides the suggestion on how to protect the devices from being infected by this kind of cybercrime 

Downloads

Download data is not yet available.

References

[1] Gazet, A., 2010. Comparative analysis of various ransomwarevirii. Journal in computer virology, 6(1), pp.77-

90.

[2] Kaspersky lab Report. Accessed on

https://media.kasperskycontenthub.com/wpcontent/uploads/sites/43/2018/03/07190822/KSN_Report_Ransom

ware_2014-2016_final_ENG.pdf.

[3] Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L. and Kirda, E., 2015, July. Cutting the gordian knot: A

look under the hood of ransomware attacks. In International Conference on Detection of Intrusions and

Malware, and Vulnerability Assessment (pp. 3-24).

[4] Marcus Hutuchins. How to Stop Ransomware Attacks. Accessed on

https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html.

[5] O'Gorman, G. and McDonald, G., 2012. Ransomware: A growing menace. Symantec Corporation.

[6] Ronny Richardson and Max North. How to protect device from ransomware. Accessed on 2 Jan 2019. Link:

http://scholarspress.us/journals/IMR/pdf/IMR-1 2017.%20pdf/IMR-v13n1art2.pdf.

[7] Scaife, N., Carter, H., Traynor, P. and Butler, K.R., 2016, June. Cryptolock (and drop it): stopping ransomware

attacks on user data. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)

(pp. 303-312). IEEE.

[8] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760.

[9] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The

Empirical Economics Letters, Vol.18; No. 3, March 2019.

[10] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International

Journal of Business Intelligence Research, Volume 5, Issue 1, April-2014.

[11] P. Mary Jeyanthi, “INDUSTRY 4.O: The combination of the Internet of Things (IoT)and the Internet of People

(IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN: 0973-9785.

[12] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An

Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN Online:

2350-1111.

[13] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in Financial

Institutions”, Vivekananda Journal of Research Vol. 7, Special Issue 1, May 2018, ISSN 2319-8702(Print),

pp. 159-164.

[14] Mary Jeyanthi, S and Karnan, M.:“Business Intelligence: Artificial bear Optimization Approach”, International

Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.

[15] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision

Making”, International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-2013.

[16] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic

Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and

Communication Engineering, Volume 3, Issue 3, March-2014.

[17] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical Study”,

International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.

[18] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud

Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)

[19] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment generation in

the field of UPVC widows” (ICSMS2019).

[20] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across

emerging countries”, International Conference on Sustainability Management and Strategy” (ICSMS2018).

[21] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International

Conference on Business Management and Information Systems” (ICBMIS2015).

[22] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International

Conference on Mathematics in Engineering & Business Management (ICMEB 2012).

[23] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear

Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering &

Business Management (ICMEB 2012).

[24] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision Making

”, 2011 IEEE International Conference on Computational Intelligence and Computing Research (2011 IEEE

ICCIC).

[25] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome the

Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing Research

(2011 IEEE ICCIC).

[26] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing and

Communication Technologies. (SCCT-2015)

[27] Dr.P.Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm for

Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019

[28] Dr.P.Mary Jeyanthi , “Customer Value Management (CVM) – Thinking Inside the box” – ISBN : 978-93-

87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.

[29] Jeyanthi, P. M., & Shrivastava, S. K. (2019). The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760.

Downloads

Published

31.10.2019

How to Cite

Rifat Ahmed, M., Juremi, J., & Ramli, J. (2019). Ransomware: The Evolution of a Cybercrime. International Journal of Psychosocial Rehabilitation, 23(4), 1228-1237. https://doi.org/10.61841/b8jeza83