Skip to main content

Trends in Design of Ransomware Viruses

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SECITC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11359))

Abstract

The ransomware nightmare is taking over the internet, impacting common users, small businesses and large ones. The interest and investment which is pushed into this market each month, tell us a few things about the evolution of both technical and social engineering, along with what is to expect in the short-coming future from them. In this paper, we analyze how ransomware programs developed in the last few years and how they were released in certain market segments throughout the deep web via RaaS (Ransomware as a Service), exploits or SPAM, while learning from their own mistakes to bring profit to the next level. We also highlight a set of mistakes that were made, which allowed for total or partial recovery of the encrypted data. We also consider the ransomware authors preference for specific encryption types, encryption key exchange mechanisms and some edge cases of encryption, which may prove to be exploitable in the near future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://labs.bitdefender.com/2018/02/gandcrab-ransomware-decryption-tool-available-for-free/.

  2. 2.

    https://www.fortinet.com/blog/threat-research/gandcrab-2-1-ransomware-on-the-rise-with-new-spam-campaign.html.

  3. 3.

    https://www.bleepingcomputer.com/news/security/the-avcrypt-ransomware-tries-to-uninstall-your-av-software.

  4. 4.

    https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf.

  5. 5.

    https://media.scmagazine.com/documents/225/bae_qbot_report_56053.pdf.

  6. 6.

    https://sites.google.com/site/bbuhrow/.

  7. 7.

    https://github.com/radii/msieve.

  8. 8.

    https://courses.csail.mit.edu/6.857/2014/files/18-das-gopal-king-venkatraman-IV-equals-zero-security.pdf.

References

  1. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2015. LNCS, vol. 9148, pp. 3–24. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20550-2_1

    Chapter  Google Scholar 

  2. Gazet, A.: Comparative analysis of various ransomware virii. J. Comput. Virol. 6(1), 77–90 (2010)

    Article  Google Scholar 

  3. Scaife, N., Carter, N., Traynor, P., Butler, K.R.B.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: IEEE 36th International Conference on Distributed Computing Systems (ICDCS) (2016)

    Google Scholar 

  4. Kharaz. A., et al.: UNVEIL: a large-scale, automated approach to detecting ransomware. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 757–772, Austin, TX, USENIX Association (2016). ISBN: 978-1-931971-32-4

    Google Scholar 

  5. Sittig, D.F., Singh, H.: A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl. Clin. Inf. 7(2), 624–632 (2016). PMC. Web. 1 October 2018

    Article  Google Scholar 

  6. Kolodenker, E., Koch, W., Stringhini, G., Egele, M.: PayBreak: defense against cryptographic ransomware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 599–611 (2017)

    Google Scholar 

  7. Gómez-Hernández, J.A., Álvarez González, L., García-Teodoro, P.: R-Locker: Thwarting ransomware action through a honeyfile-based approach. Comput. Secur. 73, 389–398 (2018)

    Article  Google Scholar 

  8. Andronio, N., Zanero, S., Maggi, F.: HELDROID: dissecting and detecting mobile ransomware. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 382–404. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26362-5_18

    Chapter  Google Scholar 

  9. Lemmou, Y., Souidi, E.M.: Inside gandcrab ransomware. In: Camenisch, J., Papadimitratos, P. (eds.) CANS 2018. LNCS, vol. 11124, pp. 154–174. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00434-7_8

    Chapter  Google Scholar 

  10. Young, A.L., Yung, M.M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings of the 17th IEEE Symposium on Security and Privacy, pp. 129–141. IEEE, May 1996

    Google Scholar 

  11. Kleinjung, T., et al.: Factorization of a 768-bit RSA modulus. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 333–350. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_18

    Chapter  Google Scholar 

  12. Bernstein, D.J.: The salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84–97. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68351-3_8

    Chapter  Google Scholar 

  13. Aditya, J., Shankar Rao, P.: Quantum Cryptography

    Google Scholar 

  14. Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005). (See also “Archived copy”. Archived from the original on 24 December 2015. Retrieved 6 February 2016.)

    Article  Google Scholar 

  15. O’Gorman, G., McDonald, G.: Ransomware: a growing menace

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Vlad Constantin Craciun , Andrei Mogage or Emil Simion .

Editor information

Editors and Affiliations

A Ransomware Families Set

A Ransomware Families Set

ACCDFISA, Amnesia, Annabelle, BadRabbit, Bart, Cerber, Crypt0l0cker, GandCrab, Globe, GlobeImposter, Hermes, HiddenTear, LeChiffre, LockCrypt, Magniber, Nemucod, NotPetya, OpenToYou, PCLock, Petya, Rapid, SamSam, Satan, Scarab, SynAck, TeslaCrypt, Troldesh, UIWIX, WannaCry, Xmas, Xorist

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Craciun, V.C., Mogage, A., Simion, E. (2019). Trends in Design of Ransomware Viruses. In: Lanet, JL., Toma, C. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2018. Lecture Notes in Computer Science(), vol 11359. Springer, Cham. https://doi.org/10.1007/978-3-030-12942-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12942-2_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12941-5

  • Online ISBN: 978-3-030-12942-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics