Abstract
Recently, the software virus Ransomware spread like a cyclone wind. As a cyclone wind creates atmospheric instability, Ransomware similarly creates computer data instability. Each user moves in the direction of digitization. The user securely holds data in his/her computer, but what if the data are “abducted”. Ransomware is a software virus that parses user data. This software can lock the system in a manner in which a person is forced to pay a ransom to retrieve his/her data. Ransomware attacks not only home computers but also company computers. This software virus encrypts data such that it cannot be deciphered by a regular individual. Thus, an individual has to pay the ransom to decrypt the data. However, the generated files are unrecognized by the computer system. This study provides an intensive review of the WannaCry Ransomware, its effect on the world of information, and the preventive measures implemented to control this Ransomware.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Denis, G., Claverie, A., Pasco, X., Darnis, J.-P., de Maupeou, B., Lafaye, M., Morel, E.: Towards disruptions in Earth observation? New Earth Observation systems and markets evolution: possible scenarios and impacts. Acta Astronaut. 137, 415–433 (2017)
Ngai, E., Ohlman, B., Tsudik, G., Uzun, E., Wählisch, M., Wood, C.A.: Can we make a cake and eat it too? A discussion of ICN security and privacy. ACM SIGCOMM Comput. Commun. Rev. 47, 49–54 (2017)
Wall, D.S.: The Internet as a conduit for criminal activity (2015)
Tardini, S., Cantoni, L.: Hypermedia, internet and the web. In: Communication and Technology, pp. 119–140 (2015)
Hauben, R.: ARPAnet (2016)
David, H.: Why are there still so many jobs? The history and future of workplace automation. J. Econ. Perspect. 29, 3–30 (2015)
Guitton, C.: Inside the Enemy’s Computer: Identifying Cyber-Attackers. Oxford University Press, Oxford (2017)
Carabas, M., Carabas, C., Gheorghe, L., Deaconescu, R., Tapus, N.: Monitoring and auditing mobile operating systems. Int. J. Space-Based Situat. Comput. 6, 54–63 (2016)
Hegarty, R., Haggerty, J.: Extrusion detection of illegal files in cloud-based systems. Int. J. Space-Based Situat. Comput. 5, 150–158 (2015)
kaspersky: Kaspersky Lab Malware Report for Q1, 2017 (2017)
Renaud, K.: It Makes You Wanna Cry. Elsevier, Cambridge (2017)
Fransen, F., Smulders, A., Kerkdijk, R.: Cyber security information exchange to gain insight into the effects of cyber threats and incidents. e & i Elektrotechnik und Informationstechnik 132, 106–112 (2015)
Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Comput. Sci. 32, 489–496 (2014)
Gross, M.L., Canetti, D., Vashdi, D.R.: Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. J. Cybersecur. 3, 49–58 (2017)
Martin, A., Menéndez, H.D., Camacho, D.: Genetic boosting classification for malware detection. In: 2016 IEEE Congress on Evolutionary Computation (CEC), pp. 1030–1037. IEEE (2016)
Weckstén, M., Frick, J., Sjöström, A., Järpe, E.: A novel method for recovery from Crypto Ransomware infections. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 1354–1358. IEEE (2016)
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 3–24. Springer (2015)
Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware (keynote). In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), p. 1. IEEE (2017)
Ali, A.: Ransomware: a research and a personal case study of dealing with this nasty malware. Issues Inf. Sci. Inf. Technol. 14 (2017)
Lee, J.K., Moon, S.Y., Park, J.H.: CloudRPS: a cloud analysis based enhanced ransomware prevention system. J. Supercomput. 73, 3065–3084 (2017)
Li, X., Shen, Y., Zhang, J.: The verifiable secure schemes for resisting attacks in cloud deduplication services. Int. J. Grid Util. Comput. 7, 184–189 (2016)
Scaife, N., Carter, H., Traynor, P., Butler, K.R.: Cryptolock (and drop it): stopping ransomware attacks on user data. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303–312. IEEE (2016)
Song, S., Kim, B., Lee, S.: The effective ransomware prevention technique using process monitoring on android platform. Mob. Inf. Syst. 2016 (2016)
Cabaj, K., Mazurczyk, W.: Using software-defined networking for ransomware mitigation: the case of cryptowall. IEEE Netw. 30, 14–20 (2016)
Sgandurra, D., Muñoz-González, L., Mohsen, R., Lupu, E.C.: Automated dynamic analysis of ransomware: benefits, limitations and use for detection. arXiv preprint arXiv:1609.03020 (2016)
Yang, T., Yang, Y., Qian, K., Lo, D.C.-T., Qian, Y., Tao, L.: Automated detection and analysis for android ransomware. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), pp. 1338–1343. IEEE (2015)
Ali, S.T., Clarke, D., McCorry, P.: Bitcoin: perils of an unregulated global P2P currency. In: Cambridge International Workshop on Security Protocols, p. 283–293. Springer (2015)
Gotora, T.T., Zvarevashe, K., Nandan, P.: A survey on the security fight against Ransomware and Trojans in Android. Int. J. Innov. Res. Comput. Commun. Eng. 2, 4115–4123 (2014)
Constantin, L.: CryptoWall ransomware held over 600 K computers hostage, encrypted 5 billion files. IDG News Service 29 (2014)
Method and system for identifying merchants selling ransomware. Google Patents (2014)
Holtfreter, R.E.: European fraudsters say pay up or your computer and files are goners!: Ransomware spreads from Europe to US and beyond. Fraud Magazine (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Shakir, H.A., Jaber, A.N. (2018). A Short Review for Ransomware: Pros and Cons. In: Xhafa, F., Caballé, S., Barolli, L. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-319-69835-9_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-69835-9_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69834-2
Online ISBN: 978-3-319-69835-9
eBook Packages: EngineeringEngineering (R0)