Ransomware from Individual Threats to Corporate Disasters
Keywords:
ransomware, malware, information securityAbstract
Ransomware is the malware that uses the victim's information as a hostage in exchange for paying the ransom. It's a very destructive threat today. With the development of changing styles from viruses to trojans and worms and use new techniques to evade detection. It also uses encryption, confidentiality technology, as a weapon to attack victims. It keep changing the pattern of spreading according to technology and targeting from general users to organizations to increase the chances of getting more ransom. This article aims to present the background, in-depth procedures of various ransomware, and prevention to reduce the risk of loss of critical information.
References
Microsoft. (2020 a). Human-operated Ransomware attacks: A preventable disaster. Retrieved from https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/
Microsoft. (2020 b). Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk. Retrieved from https://www.microsoft.com/security/blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/
Pokudom, N. (2020). Data privacy in the Digital age. EAU Heritage Journal Science and Technology, 14(2), 59-69. (in Thai).
Spadafora, A. (2020). FBI: Over $140 million handed over to Ransomware attackers. Retrieved from https://www.techradar.com/news/fbi-over-dollar140-million-handed-over-to-ransomware-attackers
Vanderlee, K. (2020). They come in the night: Ransomware deployment trends. Retrieved from https://www.fireeye.com/blog/threat-research/2020/03/they-come-in-the-night-ransomware-deployment-trends.html
Whitman, M. E., & Mattord, H. J. (2018). Principles of information security. Boston: Cengage Learning.
Wikipedia. (2020). Timeline of computer viruses and Worms. Retrieved from https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms
Young , A. L., & Yung, M. (1996). Cryptovirology: Extortion-based security threats and countermeasures. IEEE Symposium on Security & Privacy (pp. 129–141). Oakland: IEEE .
