Cryptolocking Technology


Authors : Poli Sivasankar Rao , Malidevaraju Siva Sankar Raju.

Volume/Issue : Volume 2 - 2017, Issue 6 - June

Google Scholar : https://goo.gl/h6QMZb

Scribd : https://goo.gl/g52kDe

Thomson Reuters ResearcherID : https://goo.gl/3bkzwv

Abstract : Attackers have developed a way to monetize files already on a victim’s computer. They accomplish this through en crypting select files and then charging for access to the key.\ This type of malware has spawned a new classification, cryptoransomware, but is more commonly known by the name of most prevalent version, Crypto Locker, or its variants TeslaCrypt and CryptoWall. This article will discuss how it works, how it happens, and most importantly what enterprises can do to protect themselves above and beyond IDS/IPS and antivirus systems. Prescriptive guidance for ba-sic prevention, detection, mitigation, and recovery controls is offered.

Keywords : Antivirus; Cryptoransomware; CryptoWal; TeslaCrypt; IDS/IPS; Malware;

Attackers have developed a way to monetize files already on a victim’s computer. They accomplish this through en crypting select files and then charging for access to the key.\ This type of malware has spawned a new classification, cryptoransomware, but is more commonly known by the name of most prevalent version, Crypto Locker, or its variants TeslaCrypt and CryptoWall. This article will discuss how it works, how it happens, and most importantly what enterprises can do to protect themselves above and beyond IDS/IPS and antivirus systems. Prescriptive guidance for ba-sic prevention, detection, mitigation, and recovery controls is offered.

Keywords : Antivirus; Cryptoransomware; CryptoWal; TeslaCrypt; IDS/IPS; Malware;

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe