Ransomware from Individual Threats to Corporate Disasters

Authors

  • Sorawit Boonmee School of Information Technology, Eastern Asia University
  • Supakanya Chavanich School of Law, Eastern Asia University

Keywords:

ransomware, malware, information security

Abstract

Ransomware is the malware that uses the victim's information as a hostage in exchange for paying the ransom. It's a very destructive threat today. With the development of changing styles from viruses to trojans and worms and use new techniques to evade detection. It also uses encryption, confidentiality technology, as a weapon to attack victims. It keep changing the pattern of spreading according to technology and targeting from general users to organizations to increase the chances of getting more ransom. This article aims to present the background, in-depth procedures of various ransomware, and prevention to reduce the risk of loss of critical information.

References

Microsoft. (2020 a). Human-operated Ransomware attacks: A preventable disaster. Retrieved from https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/

Microsoft. (2020 b). Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk. Retrieved from https://www.microsoft.com/security/blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/

Pokudom, N. (2020). Data privacy in the Digital age. EAU Heritage Journal Science and Technology, 14(2), 59-69. (in Thai).

Spadafora, A. (2020). FBI: Over $140 million handed over to Ransomware attackers. Retrieved from https://www.techradar.com/news/fbi-over-dollar140-million-handed-over-to-ransomware-attackers

Vanderlee, K. (2020). They come in the night: Ransomware deployment trends. Retrieved from https://www.fireeye.com/blog/threat-research/2020/03/they-come-in-the-night-ransomware-deployment-trends.html

Whitman, M. E., & Mattord, H. J. (2018). Principles of information security. Boston: Cengage Learning.

Wikipedia. (2020). Timeline of computer viruses and Worms. Retrieved from https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms

Young , A. L., & Yung, M. (1996). Cryptovirology: Extortion-based security threats and countermeasures. IEEE Symposium on Security & Privacy (pp. 129–141). Oakland: IEEE .

Downloads

Published

2021-04-16

How to Cite

Boonmee, S., & Chavanich, S. . (2021). Ransomware from Individual Threats to Corporate Disasters. EAU Heritage Journal Science and Technology (Online), 15(1), 1–10. retrieved from https://he01.tci-thaijo.org/index.php/EAUHJSci/article/view/245408

Issue

Section

Academic Articles