How Ransomware attack works? (Models & Methodologies)

The history of ransomware attacks starts in 1989. The first known attack targeted the healthcare industry (De Groot, 2020). Currently, ransomware attacks are one of the most popular cyber attacks. It is as one of the biggest threats to cybersecurity (Thomas, 2019).

 
Ransomware is a type of malware, which is basing on files encryption. To do this type of attack, hackers are using different software. However, the method of the attack is usually the same.

 

 

Ransomware attack process (The Asean Post, 2019)  
 

1. Spam attachment
The most popular method of spreading ransomware is sending the email spam with infected link or attachment inside. Usually, a message in the email is telling an action is required. For example, the hacker is sending an email with an infected file named as "invoice" to the business owner (De Groot, 2020).

  
2. Malware execution
The user, which is aware of receiving infected email is opening the attachment. The virus starts running in the background, without any alert (Singh, 2020).


3. Files encryption/Computer locked
Depends on the virus, files excluding this required to turn on the computer can be encrypted or access to a computer can be blocked. On the screen, the user can see the information about the attack and further steps, which the user has to follow to restore access. Usually, a user has to transfer money to the bitcoin wallet of a hacker (De Groot, 2020).


4. Ransom demand
As I mentioned before, usually hacker wants to receive bitcoin transfer. If the user will pay, a hacker will probably send decryption key, which will allow restoring access. However, Rashid (2016) mentioned that many attacked users paid and never regain access to the files.



References:

De Groot, J., 2020. A History Of Ransomware Attacks: The Biggest And Worst Ransomware Attacks Of All Time. [online] Digital Guardian. Available at: <https://digitalguardian.com/blog/history-ransomware-attacks-biggest-and-worst-ransomware-attacks-all-time#1> [Accessed 10 December 2020].

Rashid, F., 2016. 4 Reasons Not To Pay Up In A Ransomware Attack. [online] InfoWorld. Available at: <https://www.infoworld.com/article/3043197/4-reasons-not-to-pay-up-in-a-ransomware-attack.html> [Accessed 10 December 2020].

Singh, A., 2020. Complete Guide To Ransomware: How To Recover And Prevent An Attack. [online] Backblaze Blog | Cloud Storage & Cloud Backup. Available at: <https://www.backblaze.com/blog/complete-guide-ransomware/> [Accessed 11 December 2020].

Thomas, J., 2019. Ransomware Could Cripple ASEAN. [online] The ASEAN Post. Available at: <https://theaseanpost.com/article/ransomware-could-cripple-asean> [Accessed 10 December 2020].
 

Comments

  1. Hi

    You can still add some more in text citations in the posts
    for eg: in paragraphs of
    2. Malware execution and 3. Files encryption/Computer locked

    Many thanks
    Chirag

    ReplyDelete

Post a Comment

Popular posts from this blog

SSL Asymmetric Encryption (Diagram 2)

Opinion about safety (Survey Analysis)