Abstract
This chapter focuses on the description and analysis of ransomware, which is an advanced type of malware that infects a computer and holds victim’s data hostage for a ransom, for example, encrypting the victim’s data until a ransom is paid to decrypt them. The objectives of this chapter are to:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ransomware, https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx
Department of Justice, https://www.justice.gov/opa/pr/us-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware
Stelian Pilici, https://malwaretips.com/blogs/remove-cryptolocker-virus/
Jonathan Hassell, http://www.computerworld.com/article/2485214/microsoft-windows/cryptolocker-how-to-avoid-getting-infected-and-what-to-do-if-you-are.html
Chester Wisniewski, “CryptoLocker, CryptoWall and Beyond: Mitigating the Rising Ransomware Threat”
Lawrence Abrams, http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
Elise in Emsisoft Lab, http://blog.emsisoft.com/2013/09/10/cryptolocker-a-new-ransomware-variant/
Tor, www.torproject.org
https://www.fireeye.com/blog/threat-research/2016/03/android-malware-family-origins.html
https://developer.android.com/reference/android/Manifest.permission.html
https://developer.android.com/guide/components/intents-filters.html
Andrea Allievi, et al. Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware. https://blogs.cisco.com/security/talos/poseidon
D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology (Crypto 1982), pages 199–203, Springer-Verlag, 1983
Android - Architecture. https://www.tutorialspoint.com/android/android_architecture.htm
X. Lin, J. W. Wong, and W. Kou. “Performance Analysis of Secure Web Server Based on SSL”. Third International Workshop on Information Security (ISW 2000), Wollongong, NSW, Australia, December 20-21, 2000
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lin, X. (2018). Ransomware Analysis. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-00581-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00580-1
Online ISBN: 978-3-030-00581-8
eBook Packages: Computer ScienceComputer Science (R0)