Cyber Crime- Ransomware Malware

Added on - 18 Sep 2019

  • 14

    pages

  • 3698

    words

  • 49

    views

  • 0

    downloads

Showing pages 4 of 14
Running Head: Cyber CrimeCYBER CRIME[Document subtitle]
Cyber Crime1Table of ContentsIntroduction......................................................................................................................................1Part A...............................................................................................................................................1How Ransomware Malware attack can happen to network attached backup system..................1Methods used by Ransomware Malware for the attack...............................................................2Part B...............................................................................................................................................4Part C...............................................................................................................................................6Part D...............................................................................................................................................8Conclusion.....................................................................................................................................10References......................................................................................................................................11
Cyber Crime2IntroductionIn this paper, we are studied about the Ransomware Malware. Generally, it is said that theRansomware is a computer malware in which rogue software code effectively holds a user’scomputer hostage until a “ransom” fee is paid. The scenario that has been selected to discuss theRansomware Malware is encryption of the network attached backup system. This paper isfocused on different elements of the Ransomware Malware. For example, it defines how theRansomware attack happens in IT or other companies. It is defined one or more methods usedfor the attack. On the other hand, the laws that are broken by crypto Ransomware also discussedto aware the target audience about effects of illegal attacks of malware. Therefore, with the helpof this knowledge, the target audience can learn a lot of knowledge about different aspects ofRansomware malware and pay a significant contribution towards the management of their ITnetworks. The Ransomware malware has enough potential to influence the stored data and otherbackup systems in a negative manner. The knowledge of Ransomware malware will help them intheir career because they can apply their practical knowledge to save systems from anyunrecognized attack.Part AHow Ransomware Malware attack can happen to network attached backup systemDuggan(2017) Ransomware Malware influences the existing network-attached backup systemof different IT organizations in a significant manner. The cyber extortionists know that backupsare their most important enemy in fulfilling their desired objectives and are adapting theirRansomware to look for them. So, the priority focus of Ransomware malware is towardsencryption of the backup files. It is done with the purpose of preventing different clients from
Cyber Crime3accessing their backup data and saving themselves from fine. The first and foremost step ofRansomware Malware is to destroy Shadow copy and restore point data on Windows Systems.This performed by the different Ransomware families who are operating the malware the specialmotive to gain significant monetary profit. After planning of an attack on Shadow copy andrestore point data, it targets all attached drives and happens to encrypt the backups as well,though not likely by design. The presence of Ransomware Malware encrypts each files systemthat is attached to an infected machine. This situation might prove vulnerable for a client. Apartfrom this, the presence of Ransomware Malware also influenced the external hard drives andplugged-in USB sticks (Collier, 2017). Therefore, it is right to say that the Ransomware Malwarecomes in different forms and influence the network attached backup system in a significantmanner. There are a lot of business houses who becomes failure to test their backups properly.The main reason behind the attack of Ransomware Malware is that most of the business firmsand other small level clients did not have a recent test of their recovery process. They areengaged in doing backups, but they do not have any information about how they can recover it.So, it becomes essential for the business firms to have knowledge about network attached backupsystem and prevent Ransomware Malware attack significantly.Methods used by Ransomware Malware for the attackRansomware used a large number of methods to attack personal information of an organization.Some of the popular and common methods used by Ransomware for attack purpose includesfollowing:Exploit KitsThe first and foremost method used by Ransomware for the attack is exploiting kit. This methodis a combination of different sophisticated and important tools that exploit vulnerabilities. The