Posts

Showing posts from December, 2020

Academic Paper Summary

Image
The first page of an article (Cimitle et al., 2017)    "Talos: no more ransomware victims with formal methods" written by Cimitile, Mercaldo, Nardone, Santone and Visaggio is discussing different ways to prevent the ransomware attacks on Android devices. Authors provided evidence, which is prooving the high rate of ransomware attacks on mobile devices based on Android. Furthermore, the authors provided the summarize of most popular recently techniques, which are using to denied the ransomware attacks. Moreover, the article contains a few different protection models proposed by cybersecurity specialists such as method based on system call sequences and machine learning or the static detection system based on four scanning layers. Additionally, the authors are showing some formal methods for detecting ransomware attacks such as processes and files monitoring based on the processor usage or by using PushDown System. Moreover, the authors discuss using the algebra system CCS in c...

How Ransomware attack works? (Models & Methodologies)

Image
The history of ransomware attacks starts in 1989. The first known attack targeted the healthcare industry (De Groot, 2020). Currently, ransomware attacks are one of the most popular cyber attacks. It is as one of the biggest threats to cybersecurity (Thomas, 2019).   Ransomware is a type of malware, which is basing on files encryption. To do this type of attack, hackers are using different software. However, the method of the attack is usually the same.     Ransomware attack process (The Asean Post, 2019)       1. Spam attachment The most popular method of spreading ransomware is sending the email spam with infected link or attachment inside. Usually, a message in the email is telling an action is required. For example, the hacker is sending an email with an infected file named as "invoice" to the business owner (De Groot, 2020).    2. Malware execution The user, which is aware of receiving infected email is opening the attachment. The virus start...

General Data Protection Regulation (Computer Law)

Image
General Data Protection Regulation (GDPR) is a legal act created by European Union brought into force in 2018 (Afifi-Sabet, 2020).  This act covers many aspects of people's privacy such as method of collecting personal information, way of using cookie files and what type of information is counted as a personal data. GDPR changed the range of data, which is personal. After forced this act, every online identificator such as email address, IP address and browser history is personal data. Moreover, before GDPR many companies were collecting and storing as much data about the users as possible. Now the way of collecting and storing data is limited by GDPR. For example, it is prohibited to collect sensitive data such as users religion and beliefs, sexual orientation and political opinions (privacypolicies.com, 2020). As a part of this regulation, people can see an information about cookie files on websites. This is a part of GDPR as well. Previously, websites just inform they are using ...

Malwarebytes Anti Ransomware (Example)

Image
Malwarebytes Anti Ransomware is a part of Malwarebytes Premium. It means a user has to pay to use it. However, a user can use a free 14 days trial version. The main task of this software is to provide ransomware protection. Malwarebytes Anti Ransomware doesn't have many features. However, more protecting modules are included in Malware Premium. Ransomware attack example Encrypted files by CTB_Locker (Malwarebytes, 2016)   CTB_Locker.exe is a process, which are encrypting the files. This virus was spreading by email. The user received a message with the suggestion of immediate attention and infected .zip file (Zaharia, 2015). As we can see in the picture, files have been encrypted by CTB_Locker process.   Ransomware detection alert (Malwarebytes, 2016) Malwarebytes Anti Ransomware protected the files. CTB_Locker was blocked by the software. Malwarebytes (2016) showed, their software denied attack done by TeslaCryptor and CryptoWall as well.     References: Malwar...

Malwarebytes Anti Ransomware Features (Evaluation)

Image
Malwarebytes Anti Ransomware is available in two versions, as a single software and as an anti-ransomware tool in Malwarebytes Premium. Both versions are available to use for free during 14 days trial. Malwarebytes Anti Ransomware is a product created for companies. That fact makes, to download it the user has to contact the Malwarebytes and give some information about about the company, the number of endpoints to help Malwarebytes with creating the future offer. However, user, which want to try it on a personal computer can download it from this link: https://www.bleepingcomputer.com/download/malwarebytes-anti-ransomware/ Features of Anti Ransomware software   Malwarebytes Anti Ransomware does not have many features. As we can see in the screenshot, this software is still in Beta. It means the developer may add some functionalities in the future. Dashboard - there the user can find information about protection status and the license. Quarantine - there the user can find all of the...

Malwarebytes Anti Ransomware (Evaluation)

Image
Ransomware is type of malware, which encrypt files on victim's computer ( Fruhlinger , 2020). The most popular way to get infected by this kind of virus is opening the infected attachment in email, clicking on infected link etc. It is really difficult to decrypt the files without the key. Usually to get the encryption key, people have to pay money to the hacker.   Ransomware attack alert (OPSWAT, 2017) However, some of the companies, which are the developer of antivirus software, are creating anti ransomware software as well. I want to show Malwarebytes Anti Ransomware. Malwarebytes Anti Ransomware works on databases such as antivirus software. It means, this software can protect the users foo already known viruses. All of the most popular ransomwares are included. However, it works correctly only if user is updating software. Anderson (2020) mentioned that, Malwarebytes Anti Ransomware catched all samples of ransomware during the test. Malwarebytes Anti Ransomware is recommending ...

Case Study (Conclusion)

To sum up, the lacks in cybersecurity, forced by Chinese government can be a cause of harm for citizens, which are aware of any danger. It was not the first iCloud hack in 2014, however, attack on iCloud in China was more complicated than this from September 2014, when naked celebrities’ photos leaked, because one of the vital reasons was low-level in cybersecurity caused by using "The Great Firewall" by Chinese government and other factors such as forcing less-protected technologies. It shows, how politics aspects can participate in daily life and safety of the biggest society at the world. Additionally, this incident shows that, even one of the biggest IT company can have a trouble with providing safety to their customers.

Case Study (Discussion)

Image
In October 2014, iCloud, Apple cloud storage service was attacked by anonymous hacker or group of hackers. The method used by the hacker was "man-in-the-middle" (Timberg, 2014). This incident happened over one month after one of the most known iCloud hacks in history. In that attack, naked photos of celebrities were stolen and published on the Internet (Arthur, 2014). After that situation, Apple improved security systems and fixed some of the lacks. However, on 20 October GreatFire.org, organisation of activists, which are monitoring the censorship in Chinese Internet reported the attack in China. Apple confirmed that one day later. Moreover, they declined any responsibility for the hack. GreatFire.org states that is Chinese government fault (Timberg, 2014). Chinese government declines that blame. However, it is a fact, the Chinese government censor the Internet by using a technology called "The Great Firewall" (Shen, 2019). One of the causes of this practice is blo...

Case Study (Method)

Image
Greatfire.org, group of activists, which is monitoring Internet censorship in China reported the attack on 20 October 2014. One day later, hack has been confirmed by Apple (Timberg, 2014). Method used to hack was "man-in-the-middle" (Linshi, 2014). This method can work, when connection between user and service is not encrypted, which is common in China. Hacker can track data packages sent by user, which allows them to grab some information such as password and username (Nohe, 2018). "Man-in-the-middle" scheme (thesslstore.com, 2018) This hack starts a discussion about lacks in cybersecurity in China. GreatFire.org states that it was not their fault. Owner of the iCloud blamed Chinese government (Timberg, 2014). Moreover, the organisation mentioned, this attack can be organised by some Chinese authorities, regarding images and videos from Hong Kong protests (Augenbraun, 2014). However, the Chinese government denies responsibility for this hack (Timberg, 2014). Refere...