Research Article

Evolving Threat Agents: Ransomware and their Variants

by  Toshima Singh Rajput
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Issue 7
Published: Apr 2017
Authors: Toshima Singh Rajput
10.5120/ijca2017913666
PDF

Toshima Singh Rajput . Evolving Threat Agents: Ransomware and their Variants. International Journal of Computer Applications. 164, 7 (Apr 2017), 28-34. DOI=10.5120/ijca2017913666

                        @article{ 10.5120/ijca2017913666,
                        author  = { Toshima Singh Rajput },
                        title   = { Evolving Threat Agents: Ransomware and their Variants },
                        journal = { International Journal of Computer Applications },
                        year    = { 2017 },
                        volume  = { 164 },
                        number  = { 7 },
                        pages   = { 28-34 },
                        doi     = { 10.5120/ijca2017913666 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2017
                        %A Toshima Singh Rajput
                        %T Evolving Threat Agents: Ransomware and their Variants%T 
                        %J International Journal of Computer Applications
                        %V 164
                        %N 7
                        %P 28-34
                        %R 10.5120/ijca2017913666
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper studies different kinds of ransomware attacks right from its point of origin to the latest kind of ransomware attacks. As this malware threat has reported a significant increase in the number of report incidents happenings in countries like USA, UK and India. A study of its evolution provides for its first line of defense. So the paper offers an awareness of different kinds of ransomware variants from 1989 to 2017. It also analyses the effects of this malware on Android and Windows platform. After describing these variants it also presents the attack vectors of the Ransomware revolution. The paper also provides guidelines on preventing the losses by avoiding infection.

References
  • Common types of ransomware accessible at http://www.vinransomware.com/types-of-ransomware
  • Ransomware attackers are going old school with social engineering accessible at www.continuum.cisco.com
  • Influences on ransomwares evolution and predictions for the future challenges by Ezhil Kalaimannan, Sharon K. John, Theresa DuBose and Anthony Pinto
  • The evolution of ransomware by Kevin Savage, Peter Coogan, Hon Lau accessible at www.symantec.com
  • Types of Ransomware accessible at http://mobile.esucurityplanet.com/malware/types-of-ransomware
  • Ransomware Recap :January 14-29 2017 accessible at www.trendmicro.com
  • Ransomware Recap :January 30-February 15, 2017 accessible at www.trendmicro.com
  • Ransomware and recent variants accessible at www.us-cert.gov.in
  • Ransomware Dos and don’ts: Protecting Critical data accessible at www.symantec.com
  • Bluff Ransomware attacks Bamboozle British Businesses accessible at www.citrix.com
  • 5 Methods for detecting Ransomware activity at www.netfort.com/blog/methods-for-detecting-ransomware-activity
  • https://www.virustotal.com
  • https://avcaesar.malware.lu
  • http://contagiodump.blogspot.in/2010/11/links-and-resources-for-malware-samples.html
  • https://www.hybrid-analysis.com
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Ransomware Ransomware evolution Ransomware classification Ransomware analysis

Powered by PhDFocusTM