| Literature DB >> 34602684 |
Craig Beaman1, Ashley Barkworth1, Toluwalope David Akande1, Saqib Hakak1, Muhammad Khurram Khan2.
Abstract
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks. Different institutions such as healthcare, financial, and government have been targeted. There can be numerous reasons for such a sudden rise in attacks, but it appears working remotely in home-based environments (which is less secure compared to traditional institutional networks) could be one of the reasons. Cybercriminals are constantly exploring different approaches like social engineering attacks, such as phishing attacks, to spread ransomware. Hence, in this paper, we explored recent advances in ransomware prevention and detection and highlighted future research challenges and directions. We also carried out an analysis of a few popular ransomware samples and developed our own experimental ransomware, AESthetic, that was able to evade detection against eight popular antivirus programs.Entities:
Keywords: Antivirus; COVID-19; Cybersecurity; Malware; Ransomware; Ransomware detection; Ransomware prevention
Year: 2021 PMID: 34602684 PMCID: PMC8463105 DOI: 10.1016/j.cose.2021.102490
Source DB: PubMed Journal: Comput Secur ISSN: 0167-4048 Impact factor: 4.438
Fig. 1Categories of ransomware (Andronio et al., 2015).
List of popular ransomware strains.
| Name | Type | Main Propagation Method | Year | Source |
|---|---|---|---|---|
| Maze | Crypto | Exploits kits, Phishing emails, Remote desktop connection password cracking | 2019 | |
| REvil | Crypto | Oracle WebLogic vulnerabilities, Phishing emails, Remote desktop connection password cracking | 2019 | |
| Locky | Crypto | Phishing emails | 2016 | |
| WannaCry | Crypto | Worm | 2017 | |
| Bad Rabbit | Crypto | Drive-by downloads | 2017 | |
| Ryuk | Crypto | Phishing emails | 2018 | |
| Troldesh | Crypto | Phishing emails | 2014 | |
| Jigsaw | Crypto | Phishing emails | 2016 | |
| Petya | Locker | Phishing emails | 2016 |
Fig. 2The typical steps used by ransomware to encrypt and decrypt a user’s data. This illustrates a hybrid approach where both symmetric and asymmetric cryptography are used.
Existing review studies.
| Study | Contribution | Year |
|---|---|---|
| Various ransomware detection and mitigation techniques are presented from literature, along with their pros and cons | 2017,2020 | |
| In this article, the history of ransomware and best practices to mitigate it are presented | 2017 | |
| In this study, a review on ransomware detection and prevention is carried out | 2017 | |
| In this study, emerging ransomware attacks and a few security challenges are highlighted | 2017 | |
| This article provides a general overview of ransomware and how it works | 2016 | |
| A detailed review on ransomware attack methodology is conducted | 2017 | |
| In this study, the authors carried out a survey on Windows-based ransomware | 2020 | |
| In this study, the authors focused on detection techniques with the core focus on crypto ransomware | 2019 |
Fig. 3An overview of the utilized tools observed in literature for both ransomware prevention/mitigation and detection.
Overview of surveyed literature on ransomware prevention.
| Tool | Papers |
|---|---|
| Access Control | |
| Data Backup | |
| Key Management | |
| User Awareness |
Overview of surveyed literature on ransomware detection.
| Tool | Papers |
|---|---|
| Analyzing System Information (Log Files) | |
| Analyzing System Information (Windows Registry) | |
| File Analysis (File Differences) | |
| File Analysis (File Entropy) | |
| File Analysis (File I/O) | |
| File Analysis (File Types) | |
| Finite State Machines | |
| Honeypots | |
| Machine Learning (API/System Calls) | |
| Machine Learning (File I/O) | |
| Machine Learning (HPC Values) | |
| Machine Learning (Log Files) | |
| Machine Learning (Network Traffic) | |
| Machine Learning (Opcode/Bytecode Sequences) | |
| Machine Learning (PE Header) | |
| Machine Learning (Process Actions) | |
| Network Traffic Analysis (DGA Detection) | |
| Network Traffic Analysis (Malicious Domains) | |
| Network Traffic Analysis (Message Frequency) | |
| Network Traffic Analysis (Packet Size) | |
| Ransom Note Analysis |
Experimental results from the surveyed ransomware detection literature.
| Paper | Number of ransomware samples | Number of ransomware families | True positive rate (TPR) | Number of benign samples | False positiverate (FPR) | Accuracy | Precision | Uses machine learning |
|---|---|---|---|---|---|---|---|---|
| 840 | 3 | 840 | 97.74% | |||||
| 582 | 11 | 942 | — | |||||
| 3 | — | — | — | — | — | ✗ | ||
| — | — | — | — | — | ||||
| 582 | 11 | 87.9% | 942 | 10% | 87.91% | 89.7% | ||
| 574 | 12 | 98.25% | 442 | 0.56% | — | — | ||
| 383 | 5 | 100% | — | — | — | |||
| 504 | 12 | 65 | 5.9% | — | — | ✗ | ||
| 1477 | 13 | — | — | — | — | — | ✗ | |
| 107 | 20 | 79.4% | — | — | — | — | ✗ | |
| 475 | 44 | 98.1% | 1500 | 0% | 99.5% | 100% | ✗ | |
| 492 | 14 | 100% | — | — | — | — | ✗ | |
| — | 14 | — | ||||||
| — | — | — | — | 100% | ||||
| 2121 | 12 | 96.3% | 172 | 0% | — | — | ✗ | |
| 904 | 11 | 942 | — | |||||
| 582 | 11 | 96.34% | 942 | 1.61% | 97.62% | — | ||
| 276 | — | 98.36% | 312 | — | 97.48% | — | ||
| 38,152 | 5 | — | 2.4% | — | 99.3% | |||
| 8283 | — | 90 | 4% | — | — | |||
| 39,378 | 15 | 16,057 | — | — | ||||
| 1000 | — | — | 1000 | — | 95.9% | — | ||
| 272 | 18 | — | — | |||||
| 942 | — | — | — | — | — | |||
| 4951 | — | — | 3025 | — | 81.44% | — | ||
| 500 | 5 | 500 | — | — | ||||
| 8152 | 15 | 98.97% | 1000 | 1.85% | 97.89% | 98.16% | ||
| 100 | 4 | — | — | — | — | — | ||
| — | 1 | — | — | — | ||||
| 6048 | 12 | — | 5.9% | — | — | |||
| 787 | 2 | — | — | — | ||||
| 90 | 6 | 180 | — | |||||
| 210 | 9 | 264 | — | |||||
| 54 | 19 | 100% | — | 1 out of 15 days | — | — | ✗ | |
| 100MB | — | 87% | 100MB | — | — | 83% | ||
| 1613 | 8 | 87.6% | 100 | — | 89.5% | 87.5% | ||
| 230 | 5 | 229 | — | 100% | ||||
| 1000 | 4 | 93.4% | 1000 | — | — | 93.33% | ||
| 178 | 13 | 178 | ||||||
| 292 | — | — | 292 | — | 98.59% | — | ||
| 864 | 6 | 97.2% | 219 | 2.7% | — | — | ||
| 25 | 56% (14/25) | — | 0% | — | — | ✗ | ||
| 100 | — | 91% | 200 | — | — | — | ✗ | |
| — | 4 | 99.9% | — | 4.6% | 99.9% | 92.3% | ||
| — | — | 98.5% | — | 1.3% | — | — |
Entries that contain a dash were not found in the reviewed source.
Overview of surveyed machine learning detection approaches.
| Paper | Classifier Algorithm(s) | Features |
|---|---|---|
| Random Forest | Raw bytes | |
| Decision trees | APIs/system calls | |
| SVM, Random Forest | Strings, APIs/system calls | |
| Linear Regression | k-mer frequency | |
| Logistic Regression, SVM, ANN, Random Forest, Gradient Tree Boosting | APIs/system calls | |
| Random Forest | Log files | |
| Naïve Bayes, Logistic Regression, Decision trees, Random Forest | Log files | |
| KNN, Linear Regression, Logistic Regression, Decision trees, SVM, ANN | File I/O | |
| Random Forest | APIs/system calls | |
| Logistic Regression, SVM, Naïve Bayes | APIs/system calls, Registry keys, File I/O, Strings | |
| SVM | APIs/system calls | |
| SVM | APIs/system calls | |
| Logistic Regression, LDA, KNN, CART, Naïve Bayes, SVM, Decision trees, Random Forest | APIs/system calls | |
| Logistic Regression, SVM, Decision trees, Random Forest, KNN, Boosting, ANN | APIs/system calls | |
| CNN | APIs/system calls | |
| ANN | Log files | |
| Random Forest, Logistic Regression, Naïve Bayes, SGD, KNN, SVM | APIs/system calls | |
| Linear Regression, Decision trees | APIs/system calls | |
| Decision trees, Random Forest, Naïve Bayes, Bayesian networks, Logistic Regression, LogitBoost, Bagging, AdaBoost | Volatile memory dump features | |
| Linear Regression | APIs/system calls | |
| ANN (LSTM) | HPC values | |
| None (proof of concept) | Log files | |
| Random Forest, Bayesian Network, SVM | Network traffic | |
| Naïve Bayes, Decision trees, Random Forest | Network traffic | |
| KNN, ANN, SVM, Random Forest | CPU power usage | |
| Random Forest | Network traffic | |
| CNN | Opcodes | |
| SVM | Opcode/bytecode sequences | |
| CNN | PE header components | |
| Naïve Bayes, Logistic Regression, SVM, Random Forest, Decision trees | DLL function calls, Opcode/bytecode sequences | |
| Logistic Regression, SVM, Random Forest, Decision trees | DLL function calls, Opcode/bytecode sequences | |
| LSTM, CNN | Event sequences | |
| KNN, SVM, ANN | Network traffic | |
| Network traffic | ||
| SVM, Naïve Bayes | Network traffic | |
| ANN, KNN | Network traffic |
SVM: Support Vector Machines, ANN: Artificial Neural Networks, KNN: -nearest neighbors, LDA: Linear discriminant analysis, CART: Classification and regression trees, SGD: Stochastic Gradient Descent, CNN: Convolutional Neural Networks, LSTM: Long short-term memory
Control test results where ransomware samples were tested without any form of protection.
| WannaCry | Cerber | Thanos | Jigsaw | |
|---|---|---|---|---|
| Encrypted | Encrypted | Encrypted | Encrypted | |
| Encrypted | Encrypted | Encrypted | Encrypted | |
| Encrypted | Safe | Encrypted | Encrypted | |
| Encrypted | Safe | Encrypted | Encrypted | |
| Deleted | Safe | Encrypted | Encrypted | |
| Encrypted | Encrypted | Encrypted | Encrypted | |
| Safe | Safe | Safe | Safe | |
| Safe | Safe | Safe | Safe | |
| Safe | Safe | Safe | Safe |
A control test of two different RAASNet payloads, one with administrator privileges and one without.
| RAASNet (default) | RAASNet (admin) | |
|---|---|---|
| Encrypted | Encrypted | |
| Encrypted | Encrypted | |
| Encrypted | Encrypted | |
| Encrypted | Encrypted | |
| Encrypted | Encrypted | |
| Encrypted | Encrypted | |
| Safe | Safe | |
| Safe | Safe | |
| Safe | Safe |
RAASNet test results for different antivirus software. Both Microsoft Defender and Avira failed to stop the sample.
| Desktop | Documents | Pictures | OneDrive | |
|---|---|---|---|---|
| Encrypted | Encrypted | Encrypted | Encrypted | |
| Encrypted | Encrypted | Encrypted | Encrypted | |
| Safe | Safe | Safe | Safe | |
| Safe | Safe | Safe | Safe | |
| Safe | Safe | Safe | Safe | |
| Safe | Safe | Safe | Safe | |
| Safe | Safe | Safe | Safe | |
| Safe | Safe | Safe | Safe |