Comprehensive Survey on Petya Ransomware Attack

被引:26
作者
Aidan, Jagmeet Singh [1 ]
Verma, Harsh Kumar [1 ]
Awasthi, Lalit Kumar [1 ]
机构
[1] Dr BR Ambedkar NIT, Dept Comp Sci & Engn, Jalandhar, Punjab, India
来源
2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS) | 2017年
关键词
Cyber-attack; Ransomware; Crypto-ransomware; Malware; Petya ransomware; Mitigation;
D O I
10.1109/ICNGCIS.2017.30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent past, there has been an exponential increase in the cyber-attack. One of the most dangerous attacks in this cyber-attack is the ransomware attack which not only corrupt and encrypts the data but also steals the information from the system which can be very dangerous. One of the major ransomware attacks in recent past is the Petya ransomware attack. Methodology and threats due to Petya ransomware are discussed. Awareness and Mitigation for this are also discussed.
引用
收藏
页码:122 / 125
页数:4
相关论文
共 20 条
[1]  
Anjana T.K., 2017, International Journal for Research Trends and Innovation, V2, P310
[2]  
[Anonymous], LOCK RANS INF HELP G
[3]  
Bander A., RECENT TRENDS INFORM
[4]  
Cyber Threat Alliance, 2016, LUCR RANS ATT AN CRY
[5]  
Gazet Alexandre, 2010, J COMPUT VIROL, V6
[6]  
Kanwalinderjit G., 2016, KNOWING RANSOMWARE B
[7]  
Kelion L., 2013, CRYPTOLOCKER RANSOMW
[8]  
Kharraz A., 2015, P 12 INT C DET INTR, P3, DOI DOI 10.1007/978-3-319-20550-2_1
[9]  
Kharraz A, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P757
[10]  
LogRhythm Labs, 2016, STAT RANS PREP ATT