IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 6 - Issue 6, June 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Ransomware - Threats, Vulnerabilities And Recommendations

[Full Text]

 

AUTHOR(S)

Nadeem Shah, Mohammed Farik

 

KEYWORDS

Ransomware, WannaCry, WannaCrypt, Malware, Worm, Bitcoin

 

ABSTRACT

Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware, its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

 

REFERENCES

[1]. Deo, S. And M. Farik Information Security - Recent Attacks In Fiji. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, 2016. 5(12): P. 218-220.

[2]. Guide For Cybersecurity Event Recovery. 2016, NIST.

[3]. Coindesk. What Is Bitcoin? 2015 May 14; Available From: Http://Www.Coindesk.Com/Information/What-Is-Bitcoin/.

[4]. What Is Ransomware And 15 Easy Steps To Keep Your System Protected [Updated]. 2017; Available From: Https://Heimdalsecurity.Com/Blog/What-Is-Ransomware-Protection/.

[5]. Ransomware Common Attack Methods. 2016, Palo Alto Networks, Inc.

[6]. New Crypto-Ransomware Locky Uses Malicious Word Macros. 2016; Available From: Https://Www.Trendmicro.Com/Vinfo/Us/Security/News/Cybercrime-And-Digital-Threats/New-Crypto-Ransomware-Locky-Uses-Word-Macros.

[7]. Support For Windows XP Ended 2014; Available From: Https://Www.Microsoft.Com/En-Us/Windowsforbusiness/End-Of-Xp-Support.

[8]. Microsoft Patches Windows XP To Fight 'Wannacrypt' Attacks. 2017; Available From: Https://Www.Engadget.Com/2017/05/13/Microsoft-Windowsxp-Wannacrypt-Nhs-Patch/.

[9]. Microsoft Update Catalog. 2017; Available From: Http://Www.Catalog.Update.Microsoft.Com/Search.Aspx?Q=KB4012598.

[10]. The Current State Of Ransomware. Https://Www.Sophos.Com, 2015.

[11]. THREAT LANDSCAPE REPORT Q4 2016. 2016, Fortinet Inc.

[12]. State Of Malware Report. 2017, Malwarebytes.

[13]. Free Ransomware Decryption Tools. 2017; Available From: Https://Www.Avast.Com/Ransomware-Decryption-Tools.

[14]. AVG. Free Ransomware Decryption Tools. 2017 [Cited 2017 May 12]; Available From: Http://Www.Avg.Com/Ww-En/Ransomware-Decryption-Tools.

[15]. Download ESET Tools And Utilities. 2017; Available From: Https://Www.Eset.Com/Int/Download-Utilities/.

[16]. Mcafee Labs 2017 Threats Predictions. 2016, Mcafee. Part Of Intel Security.

[17]. End-To-End Encryption. 2017; Available From: Https://Www.Veeam.Com/Backup-Files-Encryption.Html.