Information Technology Management: Crypto-Locker Ransomware Analysis

Verified

Added on  2023/04/20

|4
|475
|380
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION TECHNOLOGY MANAGEMENT
Information Technology Management
Name of Student-
Name of University-
Author’s Note-
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION TECHNOLOGY MANAGEMENT
Crypto-Locker Ransomware Virus
When talked about malware, ransomware is very new and recent virus that is on the
trend. There are many other viruses that are on this way such as Trojan, Spyware, as well as
Viruses. But the most familiar attack of computer virus is the Ransomware virus.
US-CERT (United States Computer Emergency Readiness Team) got alerted of a
malware in the year 2013 which was a type of ransomeware attack. The name of the
ransomeware virus was named as Crypto-Locker that is a new type of ransomware (Richardson
& North, 2017). This malware restricts the user to access the computer that is infected and
demands payment from the victim in order to return the access of the system to them. The main
method of infection is phishing emails that contained malicious attachments.
How it worked
The Crypto-Locker is a malware that has ability in finding the files in a computer system
and encrypt the files that are located in the shared network or external drives or can be even from
the drives that has same cloud storage (Kharraz et al., 2015). If a single computer on the network
gets infected, all the drives on that particular network might also get infected. Crypto-Locker
attacker then connects the C2 server of the attacker for depositing the asymmetric encryption key
away from the victim’s reach. All the files on the victim’s side are encrypted using the
asymmetric encryption.
Prevention
As recommended by US-CERT the users should take the below listed preventive
measures for protecting the computer networks.
Document Page
2INFORMATION TECHNOLOGY MANAGEMENT
The users should have routine backups consisting of important files.
Maintain their anti-virus installed in their systems.
Keep their OS and Software all updated.
They should not follow any unsolicited links in their emails.
They should be aware of opening the attachments in their emails.
They should lastly follow safe practices while browsing their web.
Document Page
3INFORMATION TECHNOLOGY MANAGEMENT
References
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International Conference
on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24).
Springer, Cham.
Richardson, R., & North, M. (2017). Ransomware: Evolution, mitigation and
prevention. International Management Review, 13(1), 10-21.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]