An Kit Seminar Document
An Kit Seminar Document
By
Ankit Jaiswal
Exam No[]
Guided By
Dr. Priyanka Mehta
Certificate
This is to certify that Ankit Vinod bhai Jaiswal Exam Seat Number:
I would like to express my deepest gratitude to everyone who supported me throughout the
course of this project on ransomware detection and mitigation.
First and foremost, I am thankful to Sabargam College for providing the resources and
facilities required to carry out this research.
I am sincerely grateful to Dr. Priyanka Mehta Ma’am, whose guidance, expertise, and
constructive feedback were invaluable in shaping this work. Their insights into cybersecurity
and ransomware prevention strategies significantly contributed to the depth and quality of
this study.
Finally, I extend my heartfelt appreciation to my family and friends for their unwavering
encouragement and understanding, which gave me the strength to complete this work.
This endeavor would not have been possible without the contributions, advice, and
encouragement from all these individuals and entities.
Thank you all for your invaluable support.
4
INDEX
5
Sr Description Page no
No
1 Introduction 6
1.1 Motivation of the Study 7
2 Background 8
2.1 How Deadly the Ransomware Is? 8
2.2 Ransomware Sources 9
2.3 Ransomware Types 10
2.4 Ransomware Operation 11
2.5 The Role of Cryptocurrencies 13
3 State-of-the-Art 14
6 Conclusions 26
7 References 27
6
Abstract
Ransomware attacks have emerged as a major cyber-security threat wherein user data is
encrypted upon system infection. Latest Ransomware strands using advanced obfuscation
techniques along with offline C2 Server capabilities are hitting Individual users and big
corporations alike. This problem has caused business disruption and, of course, financial loss.
Since there is no such consolidated framework that can classify, detect and mitigate
Ransomware attacks in one go, we are motivated to present Detection Avoidance Mitigation
(DAM), a theoretical framework to review and classify techniques, tools, and strategies to
detect, avoid and mitigate Ransomware. We have thoroughly investigated different scenarios
and compared already existing state of the art review research against ours.
1. Introduction
7
Increased connectivity and digitization have facilitated cyber-criminals in designing and
launching large-scale cyber-attacks targeting individuals and corporations worldwide.
While individual naivete and lack of awareness enable these attacks to bypass basic
security mechanisms, security vulnerabilities in the IT systems of small and large
corporations are increasingly being exploited to cause business disruptions. The cyber-
attack canvas keeps expanding rapidly as cyber-criminals consistently circumvent
security provisions designed and deployed by organizations. Increasingly, the target of
the attacks is data that is critical to individuals and organizations alike. Threat actors are
cashing in on opportunities that can help them seize control of valuable data to demand a
ransom from the data owner. Ransomware is a form of malware that infects a computer or
multiple computers over a network, encrypting files and folders, rendering them unusable.
Users are then prompted for a ransom typically to be paid in cryptocurrency. Ransomware
is not a new threat, but its use is surging and causing heavy financial losses all over the
world . It is a major challenge for cyber-security analysts and Reverse Engineers as
typical Ransomware is not detected by anti-virus software due to its polymorphic nature.
According to book, almost 51% of the organizations worldwide were hit by highly
sophisticated Ransomware attacks in 2020. These attacks were using advanced command
and control servers, making them challenging to reverse engineer. Among all the
countries studied in the report, India was affected the most by the deadly Ransomware
attacks, with almost eighty-two percent of organizations being hit by Ransomware.
Netwalker is one of the newest and dangerous Ransomware strands . Its popularity is the
method of propagation, using phishing emails related to COVID-19, thus luring the
victim to download the attachments resulting in the execution of the portable binaries and
system infection. In February 2021, the latest Ransomware strand, Zeoticus 2.0, successor
to the infamous strand Zeoticus was released. Zeoticus 2.0 has raised the stakes since it is
now proving extremely hard to control and mitigate. It can execute completely offline
without requiring any command and control server. For receiving the Ransom payment,
Zeoticus uses highly secure and encrypted Proton mail accounts to evade tracing.
The history of Ransomware dates back to the late 1980s. The first Ransomware named
Acquired Immunodeficiency Syndrome (AIDS) Trojan, was released via a floppy disk.
The AIDSTrojan contained a program that would count the number of times a computer
system was started, and once this count reached the number 90, all of the files would be
encrypted. The only way to be able to use them again was to pay a ransom amount of
$189 . During the early days, Ransomware authors attacked victims to showcase their
technical prowess. It was not until the early 2000s when cyber-criminals began to exploit
users for financial gains as data gained primacy. In 2004, a Ransomware strand named
GPCode was released. GPCode infected Windows Machines via e-mail attachments. It
used a 660-Bit RSA key to encrypt files and folders . Since then, Ransomware families
like WannaCry, Cerber, Petya, etc., have evolved and caused monetary damage worth
billions of dollars. Figure 1 depicts a timeline of the prevalence of Ransomware families.
8
Figure 1. Ransomware timeline and trends.
9
2. Background
10
2.2. Ransomware Sources
2.2.3. Malvertising
Malvertising is the organized practice of infecting the advertising infrastructure that
websites use for displaying online advertisements. Malvertising has proved to be another
popular technique for infecting systems with Ransomware. It has infected systems even
via browsing trusted sites like British Broadcasting Corporation (BBC) News, America
Online (AOL) and Microsoft Network (MSN) . It tricks the browser into downloading
malicious file extensions automatically. Exploit rootkits like Angler, Magnitude and
Nuclear are then able to help the attacker gain access to the victim’s device .
Crypto Ransomware uses encryption algorithms to encrypt the victims’ data using
two approaches. In case of a Symmetric Algorithm, there is just one key that is used for
both encryption and decryption. The second algorithm which is more prevalent is the
Asymmetric Algorithm through which the data is encrypted using a public key and the
victim can only get their data back when they pay for the decryption key . Over the years,
attackers have made it difficult for reverse engineers trying to decrypt the data without
paying the ransom. Attackers now use a combination of both symmetric and asymmetric
algorithms to make the decryption process more challenging. Victim’s data is encrypted
using a symmetric algorithm due to its speed . Then, the key used is encrypted using the
public key possessed by the malicious actor .
12
2.4 Ransomware Operation
The various phases of Ransomware operation as shown in Figure 4 are detailed below:
2.4.1.Infection
The first stage is the spread of the Ransomware to the victim’s device. As discussed in
the earlier section, there are multiple sources through which Ransomware finds an
infection vector. In this stage, the strategy of the Attacker is to get their Ransomware
downloaded on the victim’s machine. This stage is heavily dependent on the victim’s
activities and overall Cyber-hygiene. If the potential victim is cyber-aware , then it is
highly possible that the Ransomware won’t be able to infect the system.
2.4.2. Encryption/Locking
Upon infection, the Ransomware starts performing its programmed sequence of
actions depending on its type. A very strong property of recent Ransomware strands is
that it contacts a central command-and-control (C2C) server through which process of
automation for the attacker becomes simple. The C2C Server also acts as a repository
through which different victims can download their decryption keys after making the
payment. After the first stage, the cryptographic keys are generated on either the victim’s
Personal Computer (PC) or in the C2C server. The attacker then proceeds to lock the files
and folders or can straight away alter the master boot record so that the victim is unable to
access their device.
2.4.3.Demand
During the third stage, a message starts getting displayed on the screen, which
demands a ransom amount from the victim, so that they can get the access back to their
system. The attacker provides a Bitcoin address for the payment of ransom. This
increases the difficulty for law enforcement agencies to trace the payment back to the
attacker.
13
2.4.4.Result
After the third stage, it is up to the user to either pay the ransom amount or not.
There are three outcomes that result at this stage. If the victim decides to pay the ransom,
then they will be provided with a decryption key to unlock access back to their devices.
Another outcome can result when the victim has strong technical skills or can take the
help of reverse engineers to reverse the Ransomware operations and get the files back.
The third outcome results from the situation when the victim is unable to pay the ransom.
This results in permanent damage and complete loss of data.
14
2.5. The Role of Cryptocurrencies
In the early days of Ransomware, attackers would demand money in the form of
direct bank deposit or via money transfer agencies. These methods of payment could
be traced back to the attacker. Since emergence of cryptocurrencies, Ransomware
attacks have exploded. This is majorly due to the fact that cryptocurrencies introduce
the concept of anonymity. Cryptocurrencies facilitate the creation of strong
Ransomware which, instead of deploying a direct one-to-one payment method, used a
third-party payment gateway so that the risk of being traced is minimized. The first
ever Ransomware that proved to be really strong in terms of maintaining anonymity
& use of a well-built encryption algorithm was CTB Locker. CTB locker stood for
Curve, The Onion Routing (TOR) and Bitcoin locker. It used elliptic curve
cryptography to encrypt the data, TOR Protocol for anonymous means of
communication between the victim and the attacker and Bitcoin as a payment method
for paying the ransom in a way that the transfer wouldn’t be traced . Usually, when a
crypto currency is set up as a payment method, an attacker passively watches the
blockchain, an enabler for cryptocurrencies to check if the ransom amount has been
paid or not. Once, the payment is made, the process of sending the decryption key to
the victim can be initiated via automation. This puts the theory of anonymity and un-
traceability into practice. Cryptocurrencies also play a very important role in
distribution of Ransomware via the dark web. Script Kiddies make use of platforms
like RaaS to buy customized strands from exploit developers. Evidence suggests that
most of the Ransomware families such as WannaCry have been successful because of
the un-traceability provided to cyber-criminals by cryptocurrencies.
15
3.State-of-the-Art
16
Table 1. Comparative analysis of the proposed survey with the state-of-the-art surveys on Ransomware detection,
avoidance, and mitigation.
17
4.The DAM Framework for Ransomware Defense
We propose the DAM framework to classify potential defense techniques, tools and
strategies for countering the menace of Ransomware.
19
the sample. To carry out behavioral analysis dynamically, SysInternals Suite and
Wireshark were made use of. WannaCry being a multi-stage Ransomware uses a process
to load the tasksche.exe f ile that in turn launches different processes. When a
ransomware attack occurs, it is really important to detect it as early as possible because in
this case, every second is significant as early detection results in a lesser degree of
damage.
Moratoetal. devised an algorithm called REDFISH which claimed to detect the
presence of ransomware in an organizational setting way before all the frameworks till
date through analysis of network traffic. The authors used around 19 ransomware families
to test their algorithm. This algorithm was designed to tackle ransomware strands that
were created to encrypt files and folders present in shared networking drives in Network
Attached Storage. After carefully evaluating all the environments where Ransomware can
persist, the authors found out that existence of SMB in a network indicated a possible
habitat where Ransomware can dwell in. They used a network traffic inspection device to
analyse the behaviour of incoming and outgoing traffic. They analysed the usage of SMB
based commands very closely to look for anomalies in the traffic. The authors ran several
tests on the algorithm and reported that REDFISH can detect ransomware within 20 s.
The authors stated that although REDFISH proved to be fast but the strands were still
able to lock 10 to 15 files before being detected. We believe REDFISH is a feasible
algorithm for organizational settings and can be easily deployed because of its minimal
impact on the server resources. Also, the network inspection device used by REDFISH
stays out of the production network, so any malware which also has the ability to launch
reverse shells for an attacker would not be able to deactivate the detection mechanism .
However, in the modern scenarios where ransomware is highly stealthy in nature, this
algorithm can fail. Recently, there is a surge of Ransomware strands that use Microsoft
Word and Excel based documents to deliver themselves onto the victims’ machines. VBA
and Excel macros can obfuscate PowerShell code within their streams so that when they
are passed through antivirus scans, they are deemed to be benign. We strongly believe
that in cases like these, REDFISH will not be able to detect the ransomware strands
within the stipulated time frame.
Chen et al. created an automated early detection tool with a novel feature of pattern
extraction. Their tool was able to capture new strands and samples through the sandbox
and was able to prepare an automated analytic report. The report was able to present the
most unique patterns and behavioural paths followed by different ransomware families.
For experimentation and validation, the authors used seven ransomware families.
Through the results of experimentation, the authors were able to find out the efficiency of
each of the algorithms used for pattern extraction. In order to unsheathe the features of
different ransomware families, they used TF-IDF, ET and LDA to automate the whole
process. The tool developed by the authors can be used in medium to large enterprises as
it can easily handle large log data and detect ransomware before other industry standard
solutions. The approach used by the authors focused on calculating the time efficiency of
different algorithms but they did not compare their tool with other frameworks and algo
rithms in effect. Also, the algorithms used require training before they can make
20
intelligent decisions. The algorithms will not work well for the latest strands like
Darkside .
Imtiaz et al. approached the problem of Android Ransomware by using a novel
methodology called DeepAMD. DeepAMD used deep ANNsfor detecting ransomware
before it could exploit other applications on the smartphone. DeepAMD used a dataset to
extract features initially for feature selection. The cleansed data resulting from feature
extraction was analysed both statically and dynamically to deem the nature of an
application. Overall, DeepAMD proved to be a novel and effective approach for early
detection of the most advanced ransomware families. This is because of a good rate of
validation of DeepAMD using the latest and updated Android Malware dataset . In
addition to detection of Ransomware, DeepAMD can also detect scareware and adware
families. Kok et al. developed a new algorithm called Pre-Encryption Detection
Algorithm (PEDA) that was able to detect Crypto Ransomware which is the most
dominant type of Ransomware. According to the authors, PEDA could detect almost all
crypto Ransomware strands in their pre-encryption stage . PEDA is a hybrid algorithm
that first examines a suspicious binary via static analysis through checksum comparison
and then dynamically via the usage of an algorithm that monitor pre-encryption APIs.
Along with this, PEDA also identified 3 APIs that could locate the presence of
Ransomware. The algorithm’s success held true for most of the Crypto strands. The only
limitation of PEDA is its high dependence on Windows API. So, if PEDA is deployed as
the only detection mechanism, it might not be able to detect the latest families.
Al-rimy et al. also created a model for early detection of Crypto Ransomware but
through a different approach. The model used two detection modules, one for analysing
the behaviour and the second for estimation of anomalies. Fusion of both the results
would then give a proper decision on whether the binary is malicious or benign. The
authors claimed that this model would certainly be able to detect zero day attacks and
advanced persistent threats. Through the results shown in the work, the model performed
extremely well in detecting the ransomware strands from a dataset of 12,000 applications.
One benefit of using this solution is that it can be used for other ecosystems too because
of the extremely low false positive rate.
21
4.2. Ransomware Avoidance Techniques
Ransomware attacks have been successful mostly because of poor Cyber-hygiene
practices. The avoidance techniques available for the masses to protect their devices from
the deadly Ransomware are very few in number and are generalized in nature.
Researchers have proposed a few advanced techniques for Ransomware avoidance, but
they are limited to specific environments and specific strands of Ransomware and hence
do not qualify as one-for-all solution.
General techniques that can be followed by users to protect their devices from
Ransomware are:
23
4.3. Ransomware Mitigation Techniques
Ever since the advent of Ransomware, cyber-defenders have been trying to come up with
advanced security solutions that would counteract different Ransomware strands. On the
other hand, Ransomware designers have exploited new vulnerabilities, preying on lack of
cyber-security awareness of a vast majority of the population to wreak havoc. Mitigation
of Ransomware attacks involve recovering encrypted data most likely through reverse
engineering or not allowing the Ransomware to complete the encryption process.
However, in the real-world mitigation techniques have had limited success. A vast
majority of individual victims of Ransomware typically end up paying the ransom
demand or losing their data permanently. Still several mitigation techniques that can
enable removal of Ransomware and recovery of devices in an efficient manner have been
proposed.
Figure 4 sums up the main mitigation methodologies based on the techniques they use.
24
5. Future Directions in Ransomware Protection
The DAM framework evaluates different combat strategies for preventing ransomware
attacks and widespread financial losses. Out of all the combat strategies, avoidance
techniques are the most desirable in protecting users and organizations from ransomware.
However, effective avoidance techniques at an organizational level entail significant cost,
large IT teams, multiple levels of security and some restricted user access privileges. At the
individual level practicing Cyber-hygiene is the only effective avoidance strategy. Since
avoidance is the holy grail for ransomware security, detection and mitigation are more viable
real-world strategies. Early and fool-proof detection of ransomware attacks is desirable if
effective mitigation strategies are to be implemented. Even though, most of the techniques
discussed above detect ransomware within a timeframe of 50 to 60 s of their initial spread,
advanced strands can perform DLL hijacking and UAC bypassing within five to ten seconds
and are able to encrypt the files within fifteen seconds. Once the files are encrypted, it is
extremely difficult to reverse engineer the operations performed. Thus, mitigation techniques
can be deployed only if detection is extremely fast and that is always a challenge as early
inferencing can lead to false positives.
It is safe to say that current technology does not offer an end-to-end security blanket
protecting individuals and large organizations from the threat of ransomware. Therefore,
organizations need to consistently invest in legal penetration testing services in addition to
purchase of cyber insurance policies. The former leads to rigorously testing the defense
perimeter and constantly upgrading and tuning the security policies to cater to new security
threats. Future directions in the evolution of ransomware protection are outlined below:
26
5.5. Use of a Sanitized Software Download Service
A repository of sanitized open-source software packages available for download as a
service can be designed which users can use to download popular software packages without
the fear of malware infection. The repository may employ a list of File Lock PEA trusted
keys. For verification purposes, each package can be matched against the stored keys and
checksums.
27
6.Conclusion
28
References
29