Prevention of Widespread Ransomware Cyber-Attacks through the SEAP Platform
Downloads
This scientific study aims to explore the potential for launching a cyber-attack through SEAP platform, particularly in light of the increasing use of ransomware as a tool to cause widespread damage to critical infrastructure. The study focuses on the methodology of a ransomware attack on a critical infrastructure, with a specific emphasis on the analysis of the infection process, persistence mechanism, encryption process, recovery prevention, and propagation mechanisms, as well as the communication with command and control servers.
Downloads
www.e-licitatie.ro.
A. Palisse et al., “Ransomware and the Legacy Crypto API”, The 11th International Conference on Risks and Security of Internet and Systems. 5th-7th September 2016 (Roscoff, France: Springer).
G. Hull, H. John, and B. Arief, “Ransomware deployment methods and analysis: views from a predictive model and human responses”, Crime Science, vol. 8, no. 1, 2019; K. Savage, P. Coogan, and H. Lau, The evolution of ransomware. Symantec, 2015.
BleepingComputer (2016). Locky Ransomware Information, Help Guide, and FAQ, https://www.bleepingcomputer.com/virus-removal/lockyransomware-information-help.
L. Abrams (2014). CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ, https://www.bleepingcomputer.com/virusremoval/cryptodefense-ransomware-information; Webroot (2017). MSP Guide: Stopping Crypto Ransomware Infections in SMBs, 16 Easy Actions for MSPs, White Paper.
WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms Maxat Akbanov, Vassilios G. Vassilakis, and Michael D. Logothetis.
D. O’Brien, “Ransomware 2017”, Internet Security Threat Report, Symantec, July 2017 [Online]. Available: https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-ransomware-2017-en.pdf.
K. Savage, P. Coogan, and H. Lau, “The evolution of ransomware”, Security Response, Symantec, June 2015 [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/securityresponse/whitepapers/the-evolution-of-ransomware.pdf.
Pestudio, Malware Assessment Tool [Online]. Available: https://www.winitor.com.
K. Cabaj and W. Mazurczyk, “Using software-defined networking for ransomware mitigation: The case of CryptoWall”, IEEE Network, vol. 30, no. 6, pp. 14–20, 2016.