2017
DOI: 10.33260/zictjournal.v1i1.19
|View full text |Cite
|
Sign up to set email alerts
|

Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security

Abstract: Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. Mission critical data has been held to ransom and victims have had to part away with millions of dollars. The advent of the anonymous Bitcoi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 11 publications
0
9
0
2
Order By: Relevance
“…To speed up the reverse engineering process, they further proposed a technique of clone-based analysis. In another study, Zimba et al [30] conducted reverse engineering to decode the ransomware code. Outcome from their study shows that despite robust encryption, the ransomware utilizes the very same attack mechanism and cryptographic abstractions as with other families in the wild.…”
Section: Reverse Engineeringmentioning
confidence: 99%
“…To speed up the reverse engineering process, they further proposed a technique of clone-based analysis. In another study, Zimba et al [30] conducted reverse engineering to decode the ransomware code. Outcome from their study shows that despite robust encryption, the ransomware utilizes the very same attack mechanism and cryptographic abstractions as with other families in the wild.…”
Section: Reverse Engineeringmentioning
confidence: 99%
“…The main gap in the literature is that there is little research focused on performing network-based analysis or detection of crypto ransomware [21] to extract potential behavioral features that can help to detect the attack before unleashing its payload. Conversely, research such as [22]- [26] only deal with extracting host-based features to detect the ransomware. In this paper, a thorough dynamic analysis of network traffic is carried out using Wireshark, and 18 network features from several protocols are extracted.…”
Section: Related Workmentioning
confidence: 99%
“…In the field of Internet, the recent frequent extortion of ransomware, such as Wannacry, Petya, Scarab, etc., has caused great losses to individuals and enterprises [25][26][27]. For rumor spreading, ordinary users often receive opinions from opinion leaders and people they are familiar with; it is a challenging problem to evaluate the influence of different information spreading ways on user adoption.…”
Section: Dynamics On Complexmentioning
confidence: 99%