Ransomware: Technical Learnings from Attack

Vol-4 | Issue-02 | February 2019 | Published Online: 20 February 2019    PDF ( 317 KB )
Author(s)
Ajay Sangwan 1; P. Alagu Manoharan 2; R. Radha Raman Chaudhary 3
Abstract

Ransomware is the most commonly known attack till date and all the security professionals are working on how to safeguard environment from such attacks and how to recover the data once the encryption has happened. Here we will be discussing about one of the well-known ransomwares called as Crypto-Ransomware. We have seen, this is the nightmare for some of the professionals but let‟s discuss about the positivity and methods we can use in future to safeguard systems in future. In this document we will learn the method used by hackers to safeguard the encryption from all the potential methods to unlock it. We are aware of the technology new discoveries, and new methodology to rectify such attacks, but we do not have clear idea how it all starts and how it starts it‟s work in the backend and when the time comes, administrators are left with no options other than paying to hackers to get the data back.

Keywords
Ransomware, crypto-ransomware, Technology
Statistics
Article View: 521