Authors :
Poli Sivasankar Rao , Malidevaraju Siva Sankar Raju.
Volume/Issue :
Volume 2 - 2017, Issue 6 - June
Google Scholar :
https://goo.gl/h6QMZb
Scribd :
https://goo.gl/g52kDe
Thomson Reuters ResearcherID :
https://goo.gl/3bkzwv
Abstract :
Attackers have developed a way to monetize files already on a victim’s computer. They accomplish this through en crypting select files and then charging for access to the key.\ This type of malware has spawned a new classification, cryptoransomware, but is more commonly known by the name of most prevalent version, Crypto Locker, or its variants TeslaCrypt and CryptoWall. This article will discuss how it works, how it happens, and most importantly what enterprises can do to protect themselves above and beyond IDS/IPS and antivirus systems. Prescriptive guidance for ba-sic prevention, detection, mitigation, and recovery controls is offered.
Keywords :
Antivirus; Cryptoransomware; CryptoWal; TeslaCrypt; IDS/IPS; Malware;
Attackers have developed a way to monetize files already on a victim’s computer. They accomplish this through en crypting select files and then charging for access to the key.\ This type of malware has spawned a new classification, cryptoransomware, but is more commonly known by the name of most prevalent version, Crypto Locker, or its variants TeslaCrypt and CryptoWall. This article will discuss how it works, how it happens, and most importantly what enterprises can do to protect themselves above and beyond IDS/IPS and antivirus systems. Prescriptive guidance for ba-sic prevention, detection, mitigation, and recovery controls is offered.
Keywords :
Antivirus; Cryptoransomware; CryptoWal; TeslaCrypt; IDS/IPS; Malware;