2023
DOI: 10.1109/mitp.2023.3297085
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors

Zubair Baig,
Sri Harsha Mekala,
Sherali Zeadally
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This type of implementation involving local keys puts the ransomware encryption scheme at risk of being blocked by the protection offered by anti-virus software which could also reveal the key to the victim. Due to this potential issue, asymmetric encryption is often used resulting in slower encryption along with a high risk of detection [10].…”
Section: Anatomy Of a Ransomware Attackmentioning
confidence: 99%
“…This type of implementation involving local keys puts the ransomware encryption scheme at risk of being blocked by the protection offered by anti-virus software which could also reveal the key to the victim. Due to this potential issue, asymmetric encryption is often used resulting in slower encryption along with a high risk of detection [10].…”
Section: Anatomy Of a Ransomware Attackmentioning
confidence: 99%
“…The majority of these malicious programs are designed to exploit users' security unawareness and inadequate permission settings [1,16,17,18,19]. Some ransomware strains specifically target accessibility services on Android to gain elevated privileges [15,20,21]. Encryption tactics used by these malicious entities often exploit the Android file system, manipulating file types that are crucial to users [22,23,24,25].…”
Section: Ransomware On Androidmentioning
confidence: 99%