Introduction to Ransomware in Computer Security

Chamod Marasinghe
Bug Zero
Published in
6 min readOct 27, 2022

--

Introduction

Ransomware can be defined as a major threat that can be affected computer systems including personal and large-scale business computers. Ransomware is playing a huge role in increasing the number of major crimes that have been committed around the world. So, in this article, let’s study what is ransomware, what are potentially harmful threats ransomware can bring to the software in the computer, and what steps can be taken for mitigating it.

How Ransomware Works (Image from: https://www.varonis.com/blog/how-to-prevent-ransomware)

What is ransomware?

“Ransom” is a term that we use when someone steals something belonging to a victim and, and threat the victim to give money or something else in exchange for the stolen thing, on the promise of returning the stolen thing. In today’s context in cyberspace, this concept is used in various ways to design malicious software. Simply, we can call that software ransomware that is designed to attack the computer system of an individual or business to steal files or other confidential personal. This software has got the name ‘ransom’ because of the software created with the purpose of extortion.

Various popular Ransomware variants

There are a large number of ransomware variants, and each variant has unique characteristics. However, some ransomware groups have been more successful than other ransomware seen, and they stand out from the crowd.

  • Ryuk:

An example of a targeted ransomware variant is the Ryuk ransomware variant. This ransomware takes over computers by using compromised user credentials to log into enterprise systems either through spear phishing emails or using Remote Desktop Protocol (RDP). Encrypts (bypassing those essential to the computer’s operation), then offer a ransom demand to provide these.

This Ryuk ransomware is known to be one of the most expensive types of ransomware out there. Ryuk usually demands more than a million dollars in ransom to return stolen information. As a result, the cybercriminals behind Ryuk will naturally and primarily focus on enterprises and systems that have enough assets and ownership to meet their demands, as well as those containing valuable information.

  • Maze:

Maze ransomware is the first ransomware variant to combine file encryption and data theft. When they refuse to pay the demanded ransom or do not fulfill the ransom demands, the collected data will be disclosed publicly or sold to the highest bidder. However, the team behind the Maze ransomware has officially ended its operations.

  • REvil (Sodinokibi):

This variant is created by the Russian-speaking REvil organization in 2019, which is responsible for numerous significant breaches like “Kaseya” and “JBS.” It has competitively battled with the Ryuk for becoming the most expensive ransomware version over the past few years. It is a famously known factor that REvil sought $800,000 in ransom per case.

REvil started out as a conventional ransomware variant, but it has since evolved. Now, it uses the Double Extortion method to steal data from businesses while also encrypting the files. This means that attackers may threaten to reveal the stolen data if a second payment is not made in addition to demanding a ransom to decrypt the data.

  • Lockbit:

The ransomware-as-a-service LockBit has been active since September 2019 with encrypts data (RaaS). This ransomware was created to quickly encrypt huge enterprises in order to avoid being quickly discovered by security appliances and IT/SOC teams.

  • Dear Cry:

Microsoft issued remedies for 04 Microsoft Exchange server vulnerabilities in March 2021 because the new ransomware version called Dear Cry tried to exploit 04 previously discovered vulnerabilities in Microsoft Exchange.

Some file types are encrypted by Dear Cry ransomware. Once the encryption process is complete, Dear Cry will display a ransom note, telling users to email the ransomware operators to request instructions on how to unlock their files.

Functionality of ransomware

We will go through some brief but detailed details about this process step by step.

  • First, the hacker who wants to steal the data sends the ransom software created by him to the parties who can be potential victims. In this case, the owner of the computer or someone who works actively in that computer network in the business unknowingly installs this software on the computer.
  • As soon as the ransomware software is installed on the computer, the hacker who created the software makes a copy of the files on the hard disk of the computer or on devices such as pen drives that are connected to the computer. These copies may contain passwords, user names, account details, and other confidential data.
  • Then the hacker encrypts the data obtained. Once this data is encrypted, the relevant party is deprived of the privilege to access the data.
  • When encrypting the data, the related public key is kept by the hacker. After that, in order to get the data there should be a relevant private key to decrypt the data.
  • In this case, the hacker will send a ransom note to the victim party. The note includes the amount required to provide the private key, the manner in which the amount should be provided, and the period during which it should be provided. Especially in order not to cover the identity of the hackers, they conduct monetary transactions with those parties using cryptocurrency.

Most of the ransomware, that works in the above way takes over computers through email and various messages.

Now, we will focus on the main actions that can be taken when ransomware is entered into an application.

  • As soon as find that ransomware has been entered into the computer, we should disconnect the internet facilities on the computer. Also, it is advised to disconnect all other devices connected to the internet. Because ransomware has the ability to copy data from all devices connected to the Internet.
  • Secondly, the affected computer should not send other data copies to other devices. Also, the data in the backup drive should not be installed on the computer.
  • We can format our operating system and reinstall it. But this is not a viable solution as the hackers still have the copies we obtained.

Ransomware has become a major threat to computer networks today. Therefore, security vendors have created various descriptors to decrypt the data files that have been encrypted by ransomware. Those can be found via online platforms such as;

  1. Id ransomware
  2. No more ransom
  3. Avast

Things you can do to protect your computer from Ransomware;

  • Keeping backup files. That means storing your data in places that are reliable and inaccessible to hackers such as Google drive, drop box.
  • Updating the virus guard frequently
  • Always use original software and updated versions of that software.
  • Disabling macro script in MS. Office software.

Conclusion

Due to the ever-advancing technology and many of the day-to-day activities, many confidential activities as well as many transactions are done mechanically to suit the new world. Therefore, there are many opportunities for data exploitation and misuse. Therefore, it is very important for people to be aware of such things.

References:

  1. https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/

Bug Zero is a bug bounty, crowdsourcing platform for security testing. The platform is the intermediatory entity that enables client organizations to publish their service endpoints so that bug hunters (security researchers / ethical hackers) registered in the platform can start testing the endpoints without any upfront charge. Bug hunters can start testing as soon as a client organization publishes a new program. Bug Zero also offers private bug bounty programs for organizations with high-security requirements.

https://bugzero.io/signup

Bug Zero is available for both hackers and organizations.

For organizations and hackers, register with Bug Zero for free, and let’s make cyberspace safe.

--

--