Analysis of Ransomware Using Reverse Engineering Techniques to Develop Effective Countermeasures

被引:1
作者
Alsharabi, Naif [1 ,2 ]
Alshammari, Mariam F. [1 ]
Alharbi, Yasser [1 ]
机构
[1] Univ Hail, Dept Comp Engn, Coll Comp Sci & Engn, Hail 55476, Saudi Arabia
[2] Amran Univ, Coll Engn & IT, Amran 00977, Yemen
关键词
ransomware; encryption; malware; crypto; reverse engineering; static analysis;
D O I
10.12720/jait.14.2.284-294
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware is the most severe threat to companies and organizations, snowballing daily. Ransomware comes in various types that are difficult for non-specialists to distinguish and evolve and change encryption techniques to avoid detection. Ransomware has become a worldwide incidence during the Corona pandemic and remote work, accountable for millions of dollars of losses annually; This malware threatens victims to lose sensitive data unless they pay a ransom, usually by encrypting the victims' hard drive contents until the ransom is paid. The study focused on literature reviews and publications issued by international organizations interested in ransomware analysis to build a strong background in this field. Used static analysis and reverse engineering methodology to investigate ransomware to understand its purpose, functionality, and effective countermeasures against it. Finally, after Dearcry and Babuk ransomware were analyzed, written the Yara rule to detect and suggested countermeasures against them to help cybersecurity professionals better understand the inner workings of real ransomware and develop advanced countermeasures against similar attacks in the future.
引用
收藏
页码:284 / 294
页数:11
相关论文
共 33 条
  • [1] Adamov A, 2017, E-W DESIGN TEST
  • [2] [Anonymous], PESTUDIO 9 46
  • [3] [Anonymous], 2018, PROC 2018 INT C COMP, DOI DOI 10.1109/ICCCI.2018.8441502
  • [4] Ariffin N., 2018, PROC 2018 CYBER RESI, P1, DOI [10.1109/CR.2018.8626868, DOI 10.1109/CR.2018.8626868]
  • [5] Ransomware Targeting Automobiles
    Bajpai, Pranshu
    Enbody, Richard
    Cheng, Betty H. C.
    [J]. AUTOSEC'20: PROCEEDINGS OF THE SECOND ACM WORKSHOP ON AUTOMOTIVE AND AERIAL VEHICLE SECURITY, 2020, : 23 - 29
  • [6] Ransomware: Recent advances, analysis, challenges and future research directions
    Beaman, Craig
    Barkworth, Ashley
    Akande, Toluwalope David
    Hakak, Saqib
    Khan, Muhammad Khurram
    [J]. COMPUTERS & SECURITY, 2021, 111
  • [7] Blackfog, 2020, STAT RANS 2020
  • [8] A Review of Ransomware Families and Detection Methods
    Chittooparambil, Helen Jose
    Shanmugam, Bharanidharan
    Azam, Sami
    Kannoorpatti, Krishnan
    Jonkman, Mirjam
    Samy, Ganthan Narayana
    [J]. RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 588 - 597
  • [9] Detect, 2018, NIST
  • [10] Gallegos-Segovia PL, 2017, 2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON)