Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method

R. Umar, I. Riadi, Ridho Surya Kusuma
{"title":"Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method","authors":"R. Umar, I. Riadi, Ridho Surya Kusuma","doi":"10.14421/ijid.2021.2423","DOIUrl":null,"url":null,"abstract":"Ransomware viruses have become a dangerous threat increasing rapidly in recent years. One of the variants is Conti ransomware that can spread infection and encrypt data simultaneously. Attacks become a severe threat and damage the system, namely by encrypting data on the victim's computer, spreading it to other computers on the same computer network, and demanding a ransom. The working principle of this Ransomware acts by utilizing Registry Query, which covers all forms of behavior in accessing, deleting, creating, manipulating data, and communicating with C2 (Command and Control) servers. This study analyzes the Conti virus attack through a network forensic process based on network behavior logs. The research process consists of three stages, the first stage is simulating attacks on the host computer, the second stage is carrying network forensics by using live forensics methods, and the third stage is analysing malware by using statistical and dynamic analysis. The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. It is possible to do so because the analysis is an initial step in generating virus signatures based on network indicators.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IJID International Journal on Informatics for Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14421/ijid.2021.2423","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Ransomware viruses have become a dangerous threat increasing rapidly in recent years. One of the variants is Conti ransomware that can spread infection and encrypt data simultaneously. Attacks become a severe threat and damage the system, namely by encrypting data on the victim's computer, spreading it to other computers on the same computer network, and demanding a ransom. The working principle of this Ransomware acts by utilizing Registry Query, which covers all forms of behavior in accessing, deleting, creating, manipulating data, and communicating with C2 (Command and Control) servers. This study analyzes the Conti virus attack through a network forensic process based on network behavior logs. The research process consists of three stages, the first stage is simulating attacks on the host computer, the second stage is carrying network forensics by using live forensics methods, and the third stage is analysing malware by using statistical and dynamic analysis. The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. It is possible to do so because the analysis is an initial step in generating virus signatures based on network indicators.
Conti勒索软件对计算机网络攻击的现场取证分析
近年来,勒索病毒已成为一种迅速增长的危险威胁。其中一个变种是Conti勒索软件,它可以传播感染并同时加密数据。攻击通过加密受害者计算机上的数据,将其传播到同一计算机网络上的其他计算机,并要求赎金,从而成为严重威胁并破坏系统。这个勒索软件的工作原理是利用注册表查询,它涵盖了访问、删除、创建、操纵数据以及与C2(命令和控制)服务器通信的所有形式的行为。本研究采用基于网络行为日志的网络取证流程对Conti病毒攻击进行分析。研究过程分为三个阶段,第一阶段是模拟对主机的攻击,第二阶段是使用现场取证方法进行网络取证,第三阶段是使用统计和动态分析对恶意软件进行分析。本研究的结果提供了在RAM和计算机网络上运行时的取证数据和病毒行为,以便获得的数据可以识别网络上的勒索软件流量并处理零日,特别是勒索软件威胁。这样做是可能的,因为分析是基于网络指标生成病毒签名的第一步。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
6
审稿时长
8 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信