Ransom Ware Research Paper

Improved Essays
History of ransom ware
Ransomware virus are carried out by trojan program. According to …, a trojan is a type of malware that is often disguised as legitimate software. This malicious program allows cyber criminals to
1) Deleting data
2) Blocking data
3) Modifying data
4) Copying data
5) Disruption the performance of computer or computer network.
First ransomware virus
In 1989, according to the “”. The AIDS Trojan, also known as the PC Cyborg virus, was the first ever ransomware virus documented. The program was written by biologist Joseph Popp, who handed out 20,000 infected disk to the people who attended the World Health Organization’s Aid conference.

Figure 1
Rise in misleading programs
In 2005, rise of misleading applications began to appear. These application disguise themselves as fake spyware removal tool, such as SpySherriff, or performance enhancement tool such as
…show more content…
May 2005 - Trojan.Gpcoder, custom-encryption techniques used were weak and easily overcome. Cyber criminals continued to refine.
Early 2006 -Trojan.Cryzip, copied data files into individual password protected archive files, and deleted original files. Password was embedded inside the code of the trojan itself, making it easily to retrieve the password.
Trojan.Archiveus like Cryzip used the same method but malware did not ask for cash payment but ask them to buy medication over the internet using certain online pharmacy URLs.
Fake Anti-Virus
2008 – 2009, cyber criminals switched to using fake anti-virus program. Program will perform mock scans, claiming to find large number of threats in the computer. User will then need to pay a fee of between US$40 – US$100 to fix the fake problems.
However, some victims chose to ignore the payment or removed the software entirely. This leads the cybercriminal to looked for some new better ways, to scam more victims.
Locker

Related Documents

  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    After the worm is downloaded, the worm on the infecting computer will close the TFTP server. If blaster finds an active network connection, it will begin to look for new machines to infect. The worm sleeps for 20 second intervals and awakens to look for new machines to infect. • The worms executable , MSBlast.exe contains two messages.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    Pt1420 Unit 1 Essay

    • 1006 Words
    • 5 Pages

    A Short History of Computer Viruses. [ONLINE] Available at:https://antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/. [Accessed 08 October 2015]. Into The New World: CASE STUDY NO. 5. 2015. Into The New World: CASE STUDY NO. 5. [ONLINE] Available at:http://febzmagz.blogspot.co.uk/2011/04/case-study-no-5.html.…

    • 1006 Words
    • 5 Pages
    Brilliant Essays
  • Improved Essays

    Ransom Ware Case Study

    • 421 Words
    • 2 Pages

    Case Project 2-5 Ransom ware is a program that prevents a user’s device from properly operating until a fee is paid. Ransom ware is malware that is highly profitable. Variation of ransom ware displays a fictitious warning that there is a problem with your computer, even if your computer is old or new, ransom ware reports the same problem. There are many types of ransom attacks, FBI warnings saying that you are a victim of child pornography is one that is most common and something we see on our computers today. A recent ransom ware attack happened in Hollywood.…

    • 421 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Second, is to use the Drive by download. Users infected by web site that contain malicious ads. Because the ads have code that scans user 's system for vulnerabilities. The vulnerability can be exploited to cause the system to download malware and execute it. Finally, it infects the system with a data-stealing program.…

    • 1807 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Every day, emails are sent to people informing them they have won a lottery, a free prize or come into money. While most people delete them, a few do not, and it can lead to families giving away thousands of dollars to con men in the pursuit of an elusive free gift or big payday. Capt. Doug Hunter talked about a number of scams deputies of the Wayne County Sheriff’s Office have been alerted to and investigated during a Skimmer and Scam Summit Tuesday at Fisher Auditorium.…

    • 628 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Summary Of Blue Pill

    • 826 Words
    • 4 Pages

    However, in order to understand what the malware does, it is necessary to understand the working of the computer system. At the core of the system is the kernel, or nucleus. This is a computer program that is the core of the system. It controls everything in the system and is the first program loaded at the startup (Rouse, 2016). It is normally loaded into a protected area of memory and takes requests from the software and translates it for use by the…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Teslacrypt Analysis

    • 1012 Words
    • 5 Pages

    The ransomware will also change your desktop wallpaper to a BMP file located on the desktop. This ransom note contains information on how to access the payment site and how to get your personal information decrypted. It also allows for a single file to be decrypted as proof that the user will be able to get all of their files back. The malware gave the user an option to pay using BitCoin, PaySafeCard, PayPal, or Ukash. The PayPal option was removed later, however.…

    • 1012 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    In this century, computers and other technology have become common household utilities in our everyday lives. Although computers are advanced, there are still people who are capable of bypassing our networking security and taking full control of other people’s computer systems. They are called “computer hackers.” Computer hackers have various reasons why they do what they do. For instance, just last month, my mom obtained a call from an anonymous party who offered to help remove files from the computer to increase performance speed, as well as to prevent viruses from infecting my system.…

    • 1836 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system.…

    • 1094 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    It attacks the victim through a malicious Android app called Porn Droid that locked the user's phone and changed its access PIN number. The cybercriminals demanding for about $500 for the payment. There is also Ransomware called Internet of Things Ransomware. Andrew Tierney and Ken Munro, demonstrated this malware attacked, locked and demanded a one-bitcoin ransom on a generally available smart thermostat at one event which is 2016 Def Con conference. Asian Country also threatened by Ransomware attack.…

    • 1139 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Computer Virus Essay

    • 1548 Words
    • 7 Pages

    It came into your computer disguised as a game. Once it was downloaded into your computer, it could wipe out your whole system. Remember the floppy disk? Since many computers at that time had no hard disks, everything had to be copied back onto a floppy disk. If there was a virus attached to a program it would be saved, along with the program it was attached to, onto this floppy disk.…

    • 1548 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    This second program that I installed functions help when navigating the web due to the fact that it had real-time protection. Whenever you go on a site that can infect your computer it will stop it and you won’t be able to access it. This program also gives you the function to check your registry for any errors. Your computer files and whenever you plug an external device to the computer it will scan it to see if it’s infected or not. You will be able to get all of these services for free.…

    • 1638 Words
    • 7 Pages
    Improved Essays