首页> 外文期刊>International Journal of Information Technology and Computer Science >Towards Data Resilience: The Analytical Case of Crypto Ransomware Data Recovery Techniques
【24h】

Towards Data Resilience: The Analytical Case of Crypto Ransomware Data Recovery Techniques

机译:迈向数据弹性:加密勒索软件数据恢复技术的分析案例

获取原文
           

摘要

Crypto ransomware has earned an infamous reputation in the malware landscape and its sound sends a lot of shivers to many despite being a new entrant. The media has not helped matters even as the myths and inaccuracies surrounding crypto ransomware continue to deepen. It’s been purported that once crypto ransomware attacks, the victim is left with no option but to pay in order to retrieve the encrypted data, and that without a guarantee, or risk losing the data forever. Security researchers are inadvertently thrown into a cat-and-mouse chase to catch up with the latest vices of the aforesaid in order to provide data resilience. In this paper, we debunk the myths surrounding loss of data via a crypto ransomware attack. Using a variety of crypto ransomware samples, we employ reverse engineering and dynamic analysis to evaluate the underlying attack structures and data deletion techniques employed by the ransomware. Further, we expose the data deletion techniques used by ransomware to prevent data recovery and suggest how such could be countered. From the results, we further present observed sandbox evasion techniques employed by ransomware against both static and dynamic analysis in an effort to obfuscate its operations and subsequently prevent data recovery. Our analyses have led us to the conclusion that no matter how devastating a crypto ransomware attack might appear, the key to data recovery options lies in the underlying attack structure and the implemented data deletion methodology.
机译:加密勒索软件在恶意软件领域享有盛誉,尽管它是新进入者,但其声音仍使许多人不寒而栗。即使围绕加密勒索软件的神话和不正确之处不断加深,媒体也无济于事。据称,一旦加密勒索软件遭到攻击,受害者就别无选择,只能付费以检索加密的数据,而且这没有保证,否则有可能永远丢失数据。为了提供数据弹性,安全研究人员无意间陷入了追赶老鼠的困境,以追赶上述最新的弊端。在本文中,我们通过加密勒索软件攻击揭穿了有关数据丢失的神话。通过使用各种加密勒索软件样本,我们采用反向工程和动态分析来评估勒索软件所采用的潜在攻击结构和数据删除技术。此外,我们介绍了勒索软件用于防止数据恢复的数据删除技术,并提出了如何应对这种情况的建议。从结果中,我们进一步介绍了勒索软件针对静态和动态分析所观察到的沙盒逃避技术,旨在混淆其操作并随后防止数据恢复。我们的分析得出的结论是,无论可能出现多么严重的加密勒索软件攻击,数据恢复选项的关键都在于底层的攻击结构和已实施的数据删除方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号