2021
DOI: 10.3390/computers10110145
|View full text |Cite
|
Sign up to set email alerts
|

In-Depth Analysis of Ransom Note Files

Abstract: During recent years, many papers have been published on ransomware, but to the best of our knowledge, no previous academic studies have been conducted on ransom note files. In this paper, we present the results of a depth study on filenames and the content of ransom files. We propose a prototype to identify the ransom files. Then we explore how the filenames and the content of these files can minimize the risk of ransomware encryption of some specified ransomware or increase the effectiveness of some ransomwar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Some reasons why this rate was not even higher were that some ransomware strains do not create ransom notes, some ransom notes were actual graphics and some ransomware strains changed the desktop background to display the ransom message. This is a promising finding as many ransomware strains create the ransom note prior to the encryption [63] of the data and a successful interception at this point in the attack would be beneficial.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some reasons why this rate was not even higher were that some ransomware strains do not create ransom notes, some ransom notes were actual graphics and some ransomware strains changed the desktop background to display the ransom message. This is a promising finding as many ransomware strains create the ransom note prior to the encryption [63] of the data and a successful interception at this point in the attack would be beneficial.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…There are normally several characteristics of this Ransom note file that can be used to distinguish it from other files. The file is normally below one KB in size, is plain text and usually contains some specific keywords such as: encrypted, ransom, tor, onion, recover, wallet, bitcoin [63]. In this test, the actual file name is also analysed for typical ransom note file name strings such as:decrypt, readme, restore and helpme.…”
Section: File Content Analysismentioning
confidence: 99%
“…Based on an OCR (Optical Character Recognition) process, the message and the payment instructions are recovered. More recently, the authors of reference [222] propose studying files related to ransomware to identify it. For that, LSA (Latent Semantic Analysis), used to seek similarities among files, and ML, used to classify files as benign or malicious, are implemented.…”
Section: Data Sourcementioning
confidence: 99%