Crypto-ransomware attacks have been a growing threat over the last few years. The goal of every ransomware strain is encrypting user data, such that attackers can later demand users a ransom for unlocking their data. To maximise their earning chances, attackers equip their ransomware with strong encryption which produce files with high entropy values. Davies et al. proposed Differential Area Analysis (DAA), a technique that analyses files headers to differentiate compressed, regularly encrypted, and ransomware-encrypted files. In this paper, first we propose three different attacks to perform malicious header manipulation and bypass DAA detection. Then, we propose three countermeasures, namely 2-Fragments (2F), 3-Fragments (3F), and 4-Fragments (4F), which can be applied equally against each of the three attacks we propose. We conduct a number of experiments to analyse the ability of our countermeasures to detect ransomware-encrypted files, whether implementing our proposed attacks or not. Last, we test the robustness of our own countermeasures by analysing the performance, in terms of files per second analysed and resilience to extensive injection of low-entropy data. Our results show that our detection countermeasures are viable and deployable alternatives to DAA.
翻译:加密勒索软件攻击是近年来不断增加的威胁。每个勒索软件都旨在加密用户数据,使攻击者可以随后向用户要求赎金以解锁其数据。为了最大化其收益机会,攻击者装备其勒索软件使用强加密产生具有高熵值的文件。Davies等人提出了差分区域分析(DAA)技术,该技术通过分析文件头来区分压缩、常规加密和勒索软件加密文件。在本文中,我们首先提出了三种不同的攻击方法,以进行恶意的头文件操作并绕过DAA检测。然后,我们提出了三个对策,即2个片段(2F)、3个片段(3F)和4个片段(4F),可以同样应用于我们提出的三种攻击。我们进行了许多实验来分析我们的对策能力,以检测被勒索软件加密的文件,无论是否执行我们提出的攻击。最后,我们通过分析执行速度和抵抗大量低熵数据注入的韧性来测试我们自己对策的强度。我们的结果表明,我们的检测对策是应用于DAA的可行且可部署的替代方案。