29.01.2018 Views

JK PANORAMA VOL 3 ISSUE 1 JANUARY

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Imran Bashir Tantray<br />

Ransomware<br />

Malicious software for RANSOM<br />

A global problem which we face in every passing year ransomware used to spread<br />

current scenario is “RANSOMWARE”.A real with different tactics. Like in 2012 ransomware<br />

threat which can disrupt or affect you anytime variants played an audio recording using the<br />

and in any part of the world.Its attacks are victims native language and anot-her one<br />

independent of your profile as it never matters bearing a fake digital certificate.In late<br />

for the attacker's that who the host is.As the 2013,ransomw-are exhibited a new behavior<br />

attacks are globally random so anyone can have and was named as “cryptolocker”. In 2014<br />

the taste of it. “RANSOMWARE” is a type of TROJ_CRIBIT.A and TROJ_CRIBIT.B<br />

software,maliciously designed to attack the emerged. In 2015 ra-someware was spread by<br />

users and hijacks their computer. During the “Angler exploit kit”.In 2016 Locky(RAattack<br />

the files in the computer are encrypted NSOM_Locky.A) was discovered and in April<br />

and the access is denied to users unless and until 2016 “JIGSAW” e-merged with innovative<br />

they pay a “RANSOM”(money paid for the routine. In may 2017 malicious worm<br />

freeing of a hostage).Due to encryption of the “wannacry/WCRY” emerged to spread<br />

files,it can be practically impossible to reverse ransomware.The attack by RANSOMWARE<br />

or crack the files without the original encryption using wannacry began on Friday,12 may<br />

key which only the attackers have access to.The 2017.By and large over 200,000 victims and<br />

restoration of encrypted files is only possible on more than 300,000 computers got infected as a<br />

payment of large amount of money as per their outcome of this attack. There are no special<br />

demand.The m-otive for ransomware attack is means by which this worm spreads,it all h-<br />

monetary as this is the only atta-ck in which a appens in a usual way.when a user is operating<br />

victim is notified and than instructed for on a computer, he/she is always one or two clicks<br />

recovery. The attackers are much vigilant and away from this attack.Sourc-es of ransomware<br />

are capable to protect their criminal identity by infection are the same as for usual computer<br />

demanding virtual payment.To decrypt the viruses i.e through email attachments and<br />

encrypted files,ransomware demand $300-$600 infected files downl-oaded with multimedia<br />

via bitcoin crptocurrency.This is a cyber attack from malicious websites. Mostly 'phish-ing'<br />

in which “WANNACRY WORM” is used and technique was used to distribute this malware.In<br />

infiltration is done. The unwanted and harmful phishing a person receives email which seems<br />

attack initially started way back in 2005- from a trusted source.Whe- n a click is done on<br />

2006,when in Russia several cases of the link in the email, malware like ransomw-are<br />

ransomware infection were found for the first gets downloaded in the system. But on 12 may<br />

time.As per report published by 'trend micro' 2017 infecti-on was likely through an exposed<br />

about a ransomware case in 2006 in which a vulnerable SMB port rather than email phishing<br />

ransomware variant (TROJ_CRYZIP.A) zipped as initially assumed.Once executed in the<br />

some file types before overwriting the original system, ransomware either locks the computer<br />

ones.Initially particular file types like screen or encrypt predetermined files.In the<br />

Doc,XLS,JPG,ZIP,PDF were encrypted by screen lock case a full screen image or<br />

ransomware.But with the passage of time its notification is displayed on the infected systems<br />

ability to encrypt many different types of files screen which prevents the victim from using<br />

gained momentum. Initially limited to Russia, their system.In the encryption type ransomware<br />

ransomware soon found its way to other prevents a-ccess to files like documents and<br />

countries across Europe due to its popularity and spreadsheets. Ransomware is considered as<br />

profitable business model fro-m there on with “scareware” as it forces users to pay a fee or<br />

16<br />

January 2018

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!