{"title":"Case Study of Ransomware Malware Hiding Using Obfuscation Methods","authors":"J. Hurtuk, M. Chovanec, Michal Kičina, R. Billík","doi":"10.1109/ICETA.2018.8572218","DOIUrl":null,"url":null,"abstract":"Ransomware problem recently proves to be a quite danger threat that after its launching ciphers the user files while storing and hiding the decryption key until a ransom is paid by the victim. This type of malware has been a lucrative business for cybercriminals and black hats. The ransomware spreading is easily possible because of the lack of prevention mechanisms in traditional detection-based protection, such as antivirus and anti-malware. Additionally, this malware forms incorporate advanced encryption algorithms and expand the number of file types in their target systems. Encrypting ransomwares target all types of businesses as well as the personal computers connected to the network. This paper discusses the creation and whole life cycle of the ransomware malware, ransomware design and implementation with DDE exploit in Python language and REST API in PHP completed with MySQL database.","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA.2018.8572218","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Ransomware problem recently proves to be a quite danger threat that after its launching ciphers the user files while storing and hiding the decryption key until a ransom is paid by the victim. This type of malware has been a lucrative business for cybercriminals and black hats. The ransomware spreading is easily possible because of the lack of prevention mechanisms in traditional detection-based protection, such as antivirus and anti-malware. Additionally, this malware forms incorporate advanced encryption algorithms and expand the number of file types in their target systems. Encrypting ransomwares target all types of businesses as well as the personal computers connected to the network. This paper discusses the creation and whole life cycle of the ransomware malware, ransomware design and implementation with DDE exploit in Python language and REST API in PHP completed with MySQL database.