We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Evolving Threat Agents: Ransomware and their Variants

by Toshima Singh Rajput
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 7
Year of Publication: 2017
Authors: Toshima Singh Rajput
10.5120/ijca2017913666

Toshima Singh Rajput . Evolving Threat Agents: Ransomware and their Variants. International Journal of Computer Applications. 164, 7 ( Apr 2017), 28-34. DOI=10.5120/ijca2017913666

@article{ 10.5120/ijca2017913666,
author = { Toshima Singh Rajput },
title = { Evolving Threat Agents: Ransomware and their Variants },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 7 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 28-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number7/27498-2017913666/ },
doi = { 10.5120/ijca2017913666 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:42.450505+05:30
%A Toshima Singh Rajput
%T Evolving Threat Agents: Ransomware and their Variants
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 7
%P 28-34
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper studies different kinds of ransomware attacks right from its point of origin to the latest kind of ransomware attacks. As this malware threat has reported a significant increase in the number of report incidents happenings in countries like USA, UK and India. A study of its evolution provides for its first line of defense. So the paper offers an awareness of different kinds of ransomware variants from 1989 to 2017. It also analyses the effects of this malware on Android and Windows platform. After describing these variants it also presents the attack vectors of the Ransomware revolution. The paper also provides guidelines on preventing the losses by avoiding infection.

References
  1. Common types of ransomware accessible at http://www.vinransomware.com/types-of-ransomware
  2. Ransomware attackers are going old school with social engineering accessible at www.continuum.cisco.com
  3. Influences on ransomwares evolution and predictions for the future challenges by Ezhil Kalaimannan, Sharon K. John, Theresa DuBose and Anthony Pinto
  4. The evolution of ransomware by Kevin Savage, Peter Coogan, Hon Lau accessible at www.symantec.com
  5. Types of Ransomware accessible at http://mobile.esucurityplanet.com/malware/types-of-ransomware
  6. Ransomware Recap :January 14-29 2017 accessible at www.trendmicro.com
  7. Ransomware Recap :January 30-February 15, 2017 accessible at www.trendmicro.com
  8. Ransomware and recent variants accessible at www.us-cert.gov.in
  9. Ransomware Dos and don’ts: Protecting Critical data accessible at www.symantec.com
  10. Bluff Ransomware attacks Bamboozle British Businesses accessible at www.citrix.com
  11. 5 Methods for detecting Ransomware activity at www.netfort.com/blog/methods-for-detecting-ransomware-activity
  12. https://www.virustotal.com
  13. https://avcaesar.malware.lu
  14. http://contagiodump.blogspot.in/2010/11/links-and-resources-for-malware-samples.html
  15. https://www.hybrid-analysis.com
Index Terms

Computer Science
Information Sciences

Keywords

Ransomware Ransomware evolution Ransomware classification Ransomware analysis