Ransomware has emerged as an infamous malware that has not escaped a lot of myths and inaccuracies from media hype. Victims are not sure whether or not to pay a ransom demand without fully understanding the lurking consequences. In this paper, we present a ransomware classification framework based on file-deletion and file-encryption attack structures that provides a deeper comprehension of potential flaws and inadequacies exhibited in ransomware. We formulate a threat and attack model representative of a typical ransomware attack process from which we derive the ransomware categorization framework based on a proposed classification algorithm. The framework classifies the virulence of a ransomware attack to entail the overall effectiveness of potential ways of recovering the attacked data without paying the ransom demand as well as the technical prowess of the underlying attack structures. Results of the categorization, in increasing severity from CAT1 through to CAT5, show that many ransomwares exhibit flaws in their implementation of encryption and deletion attack structures which make data recovery possible without paying the ransom. The most severe categories CAT4 and CAT5 are better mitigated by exploiting encryption essentials while CAT3 can be effectively mitigated via reverse engineering. CAT1 and CAT2 are not common and are easily mitigated without any decryption essentials.
翻译:在本文中,我们提出了一个基于文件删除和文件加密攻击结构的赎金软件分类框架,以更深入地理解赎金软件中可能存在的缺陷和不足;我们制定了一个威胁和攻击模型,代表一个典型的赎金软件攻击程序,我们从中得出基于拟议分类算法的赎金软件分类框架;框架将赎金软件袭击的震荡分解为以下内容:在不完全理解潜伏的后果的情况下,能否支付赎金需求是否支付赎金;在本文件中,我们提出了一个基于档案删除和文件加密攻击结构的赎金软件分类框架,以更深入地理解赎金软件中可能存在的缺陷和不足;我们制定了一个威胁和攻击模型,代表一个典型的赎金软件袭击程序,我们从中得出了根据拟议分类算法制定的赎金软件分类框架;框架将赎金软件袭击的震荡分解为,要求有可能在不支付赎金需求以及基本袭击结构的技术特点的基础上,以恢复被攻击数据的潜在方法的总体效力,而不支付赎金需求;从CAT1到CAT5的日益严重到CAT5,结果显示,许多赎金软件在执行加密和删除攻击结构时存在缺陷,使数据回收成为可能,而无需支付赎金。