Skip to main content

Ransomware Analysis

  • Chapter
  • First Online:
Introductory Computer Forensics

Abstract

This chapter focuses on the description and analysis of ransomware, which is an advanced type of malware that infects a computer and holds victim’s data hostage for a ransom, for example, encrypting the victim’s data until a ransom is paid to decrypt them. The objectives of this chapter are to:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ransomware, https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx

  2. Department of Justice, https://www.justice.gov/opa/pr/us-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware

  3. Stelian Pilici, https://malwaretips.com/blogs/remove-cryptolocker-virus/

  4. Jonathan Hassell, http://www.computerworld.com/article/2485214/microsoft-windows/cryptolocker-how-to-avoid-getting-infected-and-what-to-do-if-you-are.html

  5. Chester Wisniewski, “CryptoLocker, CryptoWall and Beyond: Mitigating the Rising Ransomware Threat”

    Google Scholar 

  6. Lawrence Abrams, http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information

  7. Elise in Emsisoft Lab, http://blog.emsisoft.com/2013/09/10/cryptolocker-a-new-ransomware-variant/

  8. Tor, www.torproject.org

  9. https://www.fireeye.com/blog/threat-research/2016/03/android-malware-family-origins.html

  10. https://www.virustotal.com/

  11. https://github.com/rednaga/axmlprinter

  12. https://developer.android.com/reference/android/Manifest.permission.html

  13. https://developer.android.com/guide/components/index.html

  14. https://developer.android.com/guide/components/intents-filters.html

  15. http://jd.benow.ca/

  16. https://en.wikipedia.org/wiki/Dynamic_program_analysis

  17. https://github.com/androguard/androguard

  18. https://sable.github.io/soot/

  19. http://stackoverflow.com/questions/17831990/how-do-you-install-google-frameworks-play-accounts-etc-on-a-genymotion-virt

  20. https://developer.android.com/studio/command-line/adb.html

  21. https://www.trishtech.com/2014/08/decrypt-simplelocker-encrypted-files-with-eset-simplelocker-decryptor/

  22. dex2jar https://github.com/pxb1988/dex2jar

  23. Andrea Allievi, et al. Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware. https://blogs.cisco.com/security/talos/poseidon

  24. D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology (Crypto 1982), pages 199–203, Springer-Verlag, 1983

    Google Scholar 

  25. Android - Architecture. https://www.tutorialspoint.com/android/android_architecture.htm

  26. X. Lin, J. W. Wong, and W. Kou. “Performance Analysis of Secure Web Server Based on SSL”. Third International Workshop on Information Security (ISW 2000), Wollongong, NSW, Australia, December 20-21, 2000

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lin, X. (2018). Ransomware Analysis. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00581-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00580-1

  • Online ISBN: 978-3-030-00581-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics