CFP last date
20 December 2024
Reseach Article

Crypted_Pony Ransomware- A Mysteries Entity in Cyber World

by Krunal A. Gandhi, Viral D. Patel, Siba Ram Raut, Kavita A. Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 44
Year of Publication: 2019
Authors: Krunal A. Gandhi, Viral D. Patel, Siba Ram Raut, Kavita A. Joshi
10.5120/ijca2019918566

Krunal A. Gandhi, Viral D. Patel, Siba Ram Raut, Kavita A. Joshi . Crypted_Pony Ransomware- A Mysteries Entity in Cyber World. International Journal of Computer Applications. 181, 44 ( Mar 2019), 45-49. DOI=10.5120/ijca2019918566

@article{ 10.5120/ijca2019918566,
author = { Krunal A. Gandhi, Viral D. Patel, Siba Ram Raut, Kavita A. Joshi },
title = { Crypted_Pony Ransomware- A Mysteries Entity in Cyber World },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2019 },
volume = { 181 },
number = { 44 },
month = { Mar },
year = { 2019 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number44/30416-2019918566/ },
doi = { 10.5120/ijca2019918566 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:06.809177+05:30
%A Krunal A. Gandhi
%A Viral D. Patel
%A Siba Ram Raut
%A Kavita A. Joshi
%T Crypted_Pony Ransomware- A Mysteries Entity in Cyber World
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 44
%P 45-49
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s cyber world, it is difficult to trap the hackers and for the innocent users who are unaware of this kind of crimes can be easily trapped. The world had already seen the effect of ransomware where professionals were also trapped and company lost huge amount of money in terms of bit-coins. So in this study paper, the post effects of ransomware are discussed.

References
  1. Gandhi Krunal A., Patel Viral D. “ Ransomware- A New Era of Cyber Attack https://www.ijcaonline.org/archives/volume168/number3/krunal-2017-ijca-914446.pdf
  2. Remove .crypted_pony Files Virus from Windows 7 : Clean .crypted_pony Files Virus.[online]: https://www.stepstoremovevirus.com/remove-crypted_pony-files-virus-from-windows-7-clean-crypted_pony-files-virus
  3. crypted_pony Files Virus (Pony) – How to Remove Itby Ventsislav Krastev [online]:  https://sensorstechforum.com/remove-pony-ransomware/
  4. G. O’Gorman and G. McDonald, "Ransomware: a growing menace," Symantec Corporation, 2012.
  5. B. N. Giri, N. Jyoti and M. AVERT, "The Emergence of Ransomware," AVAR, Auckland, 2006.
  6. J.-L. Richet, "Extortion on the internet: the rise of cryptoransomware.," Harvard , 2016. International Journal of Computer Applications (0975 – 8887) Volume 168 – No.3, June 2017 41
  7. A. Bhardwaj, G. Subrahmanyam, V. Avasthi and H. Sastry, "Ransomware: A rising threat of new age digital extortion.," in arXiv preprint arXiv:1512.01980, 2015.
  8. X. Luo and Q. Liao, "Awareness education as the key to ransomware prevention.," Information Systems Security, vol. 16, no. 4, pp. 195-202, 2007.
  9. A. Gazet, "Comparative analysis of various ransomware virii," Journalin computer virology, vol. 6, no. 1, pp. 77- 90, 2010.
  10. M. Fossi, G. Egan, K. Haley, E. Johnson, T. Mack, T. Adams, J.Blackbird, M. Low, D. Mazurek, D. McKinney and P. Wood, "Symantec internet security threat report trends for 2010," Symantec, 2011.
  11. B. Foster and Y. Lejins, "Ehealth security Australia: The solution lies with frameworks and standards.," 2013.
  12. J. C. a. E. A. B. Hernandez-Castro, "UK has little to be proud of assurvey reveals sorry state of European cybersecurity," University of Kent, 2015. [Online]. Available: https://kar.kent.ac.uk/51071/1/uk-haslittle- tobe-proud-of-as-survey-reveals-sorry-state-of european cyber security-37505. [Accessed 2016].
  13. K.-K. R. Choo and R. G. Smith, "Criminal exploitation of online systems by organised crime groups," Asian journal of criminology, vol. 3, no. 1, pp. 37-59, 2008.
  14. K. Gradon, "Crime science and the internet battlefield: Securing the analog world from digital crime.," Security & Privacy, IEEE, vol. 11, no. 5, pp. 93-95, 2013.
  15. T. Zhang, H. Antunes and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework.," Internet of Thing
Index Terms

Computer Science
Information Sciences

Keywords

Ransomware bitcoins Crypted_pony Payment Education