logo

Potential Threats and Mitigation Tools for Ransomware

   

Added on  2023-06-10

10 Pages2689 Words368 Views
Running head: POTENTIAL THREATS AND MITIGATION TOOLS FOR RANSOMWARE
Potential Threats and Mitigation Tools for Ransomware
Name of the Student
Name of the University
Author’s note

1POTENTIAL THREATS AND MITIGATION TOOLS FOR RANSOMWARE
Table of Contents
1. Introduction.......................................................................................................................................2
2. Variants of Ransomware....................................................................................................................2
3. Working Mechanism of Ransomware................................................................................................3
4. Potential Threats...............................................................................................................................3
5. Recent Attacks...................................................................................................................................4
6. Mitigation Tools.................................................................................................................................4
7. Summary...........................................................................................................................................5
8. References.........................................................................................................................................7

2POTENTIAL THREATS AND MITIGATION TOOLS FOR RANSOMWARE
1. Introduction
Ransomware is a form of malicious software that would be able to threaten the computer of
users with the denial of access on the personal data of the user. It could be defined as the subset of
a malware. The data would be locked with the help of encryption and then payment is demanded.
The primary motive for ransomware is based on monetary aspects. The access to the files are denied
and the victims are charged with ransom amounts for decrypting the files [10].
Unlike most of the other forms of malware, the ransomware normally infects computers by
clicking on any unsafe link or while downloading some form of unsafe programs. The society
normally gets affected as the data, which is stored in various servers of top companies gets affected.
This might lead to permanent or temporary loss of information and also incur financial losses.
Another form of social impacts would include the disruption of regular operations within the
targeted organization. This would lead to potential harm to the concerned organization.
2. Variants of Ransomware
The five variants of ransomware in the recent times are: CryptoLocker, TeslaCrypt,
SimpleLocker, WannaCry and NotPetya.
The report would primarily focus on the WannaCry ransomware. The WannaCry
ransomware is a recent form of ransomware worm that is capable of spreading a vast number of
computing networks that had attacked the computers in the month of May in 2017. The
ransomware spreads by affecting and infecting a Windows computer. It would encrypt the user data
that is stored on the hard drive, thus making it extremely impossible for the users for accessing
them. The system would then demand a ransom amount of money that would be paid in terms of
bitcoin cryptocurrency. After the money is received by the hackers, they would grant the access to
the user [1]. The ransomware mainly broadcasted through an exploit, EternalBlue within the older
model of the Windows operating system. The WannaCry ransomware took the advantages of
installation within the backdoors of the older systems.
The WannaCry ransomware had struck a vast number of important and high-profile systems
that had included the National Health Service of Britain. The ransomware had exploited the
vulnerability within the Windows based computers. The ransomware was firstly detected by the
United States National Security Agency. The agency had links with Symantec and other researchers
based within the Lazarus Group. The spread of the ransomware was stopped within few days of
discovery with the latest security patches that were released by Microsoft. A discovery that was

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware: Impact, Variants, Working Mechanism, Threats, and Mitigation Tools
|15
|3067
|180

IT Security: WannaCry Ransomware Attack
|12
|3038
|37

Overview of Network Security: Types, Working Mechanism, Threats, Mitigation Tools
|9
|1863
|305

Demonstration of a Cyber Security Threat: Ransomware
|19
|815
|500

Ransomware Malware: A Walkthrough and Real World Example
|5
|1180
|59

The WannaCry Ransomware: Concept, Impact, and Response
|13
|774
|175