Kriativ-tech Volume 1, Issue 10, February 2025, Pages: xxx Received: Fev. 25, 2025; Accepted: Fev. 25, 2025. Published: Fev. 25, 2025.

Authors

Pedro Brandao, Full Professor ISTEC, Assistent Professor – Universidade Lusíada de Lisboa - FCEEIsabel Mendonça. Computer Science Degree Student, Universidade Lusíada de Lisboa - FCEE

Media

PDF

To cite this article

Pedro Brandao, Isabel Mendonça The Danger of Ransomware Threats: A Comprehensive AnalysisDOI: 10.31112/kriativ-tech-2023-06-96

Abstract

Ransomware is a type of threat to computer security which involves a program that, when executed, holds a computer system or the user’s data ransom by making them inactive, encrypted, and hidden from the user. After the user’s data is completely encrypted, the attacker will demand a ransom from the victim in exchange for the decryption key. The victim has to obtain and send the payment to the attacker within the given period, or the key will be lost forever. There have been numerous ransomware attacks targeting ordinary users, companies, public sectors, and even high profile medical facilities, to name a few instances [1].What makes ransomware a dangerous threat is the different types that can be built: including file-encrypting, data-hiding, and lockscreen ransomware. Each of these types is designed to target different aspects of a computer system, and they are typically delivered through various methods as well. This makes it difficult for an average user to understand how ransomware works and how to protect against it. Additionally, since the dawn of Bitcoin, these attacks have spiked. Prior to this modern advancement, attackers needed to ask for bank information, which left a traceable paper trail; therefore, criminals were more afraid of being caught.There is always something to take away from a ransomware incident whenever it happens. It is important to think ahead and do the R&D to analyze and understand the threat, know how it infects the system, what kind of ransomware was used, where are the encrypted keys stored, can the attack be stopped at any point, etc., while also being careful about how high-risk fields operate. No organization would ever want to lend itself liable to a lawsuit because of negligence due to insufficient security measures and potential harm to other third parties connected to that particular environment.

Keywords

Cybersecurity, Ransomware, Malware.

References

[1] S. M Aziz, "Ransomware in High-Risk Environments," 2016. [PDF][2] A. Zimba, M. Chishimba, and S. Chihana, "A Ransomware Classification Framework Based on File-Deletion and File-Encryption Attack Structures," 2021. [PDF][3] N. Pattnaik, J. R. C. Nurse, S. Turner, G. Mott et al., "It's more than just money: The real-world harms from ransomware attacks," 2023. [PDF][4] J. Ahn, D. Park, C. G. Lee, D. Min et al., "KEY-SSD: Access-Control Drive to Protect Files from Ransomware Attacks," 2019. [PDF][5] N. Dugan, "Security awareness training in a corporate setting," 2018. [PDF][6] C. J.W. Chew and V. Kumar, "Behaviour based ransomware detection," 2019. [PDF][7] K. Cabaj, M. Gregorczyk, and W. Mazurczyk, "Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics," 2016. [PDF][8] H. Ghayoomi, K. Laskey, E. Miller-Hooks, C. Hooks et al., "Assessing resilience of hospitals to cyberattack," 2021. ncbi.nlm.nih.gov[9] A. Laszka, S. Farhang, and J. Grossklags, "On the Economics of Ransomware," 2017. [PDF][10] J. Pont, O. Abu Oun, C. Brierley, B. Arief et al., "A Roadmap for Improving the Impact of Anti-Ransomware Research," 2019. [PDF]