2021년 랜섬웨어 현황 및 대응/예방 정책 동향 |
Kim, Soram
(국민대학교 금융정보보안학과)
Kang, Soojin (국민대학교 금융정보보안학과) Choi, Yongcheol (국민대학교 금융정보보안학과) Park, Gwuieun (국민대학교 정보보안암호수학과) Lee, Minjeong (국민대학교 정보보안암호수학과) Kim, Jongsung (국민대학교 정보보안암호수학과/금융정보보안학과) |
1 | 과학기술정보통신부, "https://www.msit.go.kr/bbs/view.do?sCode=user&mId=113&mPid=112&bbsSeqNo=94&nttSeqNo=3179937" |
2 | Avast, "https://www.avast.com/ransomware-decryption-tools#babuk" |
3 | Avast, "https://files.avast.com/files/decryptor/avast_decryptor_atomsilo.exe" |
4 | Avast, "https://www.avast.com/ransomware-decryption-tools#babuk" |
5 | 과학기술정보통신부, " '21년 사이버위협 분석 및 '22년 전망 분석", pp.1-8, 2021 |
6 | 대한민국 정책브리핑, "https://www.korea.kr/news/policyNewsView.do?newsId=148887607" |
7 | 한국인터넷진흥원 (KISA), "2021년 3분기 랜섬웨어 동향 보고서", pp.1-42, 2021 |
8 | 동아일보, "https://www.donga.com/news/Economy/article/all/20210601/107203283/1" |
9 | ESTSecurity, "https://blog.alyac.co.kr/3825" |
10 | 보안뉴스, "https://www.boannews.com/media/view.asp?idx=98830" |
11 | ESTSecurity, "https://blog.alyac.co.kr/3527" |
12 | Quick Heal Blog, "https://blogs.quickheal.com/activists-turn-hacktivists-new-ransomware-that-does-not-demand-money/" |
13 | INCA Blog, "https://isarc.tachyonlab.com/3942" |
14 | Bleeping Computer, "https://www.bleepingcomputer.com/news/security/n3tw0rm-ransomware-emerges-in-wave-of-cyberattacks-in-israel/" |
15 | SentinelLABS, "https://www.sentinelone.com/labs/hive-attacks-analysis-of-the-human-operated-ransomware-targeting-healthcare/" |
16 | SOPHOS NEW, "https://news.sophos.com/en-us/2021/10/04/atom-silo-ransomware-actors-use-confluence-exploit-dll-side-load-for-stealthy-attack/" |
17 | CYWARE SOCIAL, "https://cyware.com/news/chaos-ransomware-targeting-minecraft-gamers-in-japan-6ec628e2" |
18 | BleepingComputer, "https://www.bleepingcomputer.com/news/security/new-yanluowang-ransomware-used-in-targeted-enterprise-attacks/" |
19 | KISA stop RANSOMWARE, "https://boho.or.kr/ransom/main.do" |
20 | ESTSecurity, " https://blog.alyac.co.kr/3654" |
21 | Emsisoft, "https://www.emsisoft.com/ransomware-decryption-tools/ragnarok" |
22 | CISA, "https://www.cisa.gov/news/2021/01/21/cisa-launches-campaign-reduce-risk-ransomware" |
23 | NIST, "https://csrc.nist.gov/Projects/ransomware-protection-and-response" |
24 | The White House, "https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federalgovernment-networks/" |
25 | Interpol, "https://www.interpol.int/News-and-Events/News/2021/Immediate-action-required-to-avoid-Ransomware-pandemic-INTERPOL" |
26 | CISA, "https://www.cisa.gov/stopransomware" |
27 | Department of Home Affairs, "https://www.homeaffairs.gov.au/cyber-security-subsite/files/ransomware-action-plan.pdf" |
28 | CISA, "https://us-cert.cisa.gov/sites/default/files/publications/AA21-131A_Darkside_Ransomware.pdf" |
29 | CISA, "https://us-cert.cisa.gov/ncas/current-activity/2021/07/04/cisa-fbi-guidance-msps-and-their-customers-affected-kaseya-vsa" |
30 | Emsisoft, "https://www.emsisoft.com/ransomware-decryption-tools/ziggy" |
31 | Bitdefender, "https://labs.bitdefender.com/2021/02/fo- nix-ransomware-decryptor/" |
32 | Emsisoft, "https://www.emsisoft.com/ransomware-decryption-tools/avaddon" |
33 | Nomoreransome, "https://www.nomoreransom.org/ko/decryption-tools.html#JudgeNoCry" |
34 | FBI, "https://www.documentcloud.org/documents/21049431-fbi-flash-hiveransomware-iocs" |
35 | Emsisoft, "https://www.emsisoft.com/ransomware-decryption-tools/synack" |
36 | Trustwave, "https://github.com/SpiderLabs/BlackByteDecryptor" |
37 | Bleeping Computer, "https://www.bleepingcomputer.com/news/security/lockfile-ransomware-uses-petitpotam-attack-to-hijack-windows-domains/" |
38 | warren.senate.gov, "https://www.warren.senate.gov/newsroom/press-releases/warren-and-ross-introduce-bill-to-require-disclosures-of-ransomware-payments" |
39 | The White House, "https://www.whitehouse.gov/briefing-room/statements-releases/2021/07/28/national-security-memorandum-on-improving-cybersecurity-for-critical-infrastructure-control-systems/" |
40 | U.S. DEPARTMENT OF THE TREASURY, "https://home.treasury.gov/news/press-releases/jy0364" |
41 | CISA, "https://www.cisa.gov/sites/default/files/publications/JCDC%20Slick%20Sheet_09.15.2021_508_0.pdf" |
42 | DATANET, "https://www.datanet.co.kr/news/articleView.html?idxno=164714" |
43 | 매일경제, "https://www.mk.co.kr/news/it/view/2021/06/553716/" |
44 | 보안뉴스, "https://www.boannews.com/media/view.asp?idx=97701" |
45 | 한국인터넷진흥원 (KISA), "2021년 1분기 랜섬웨어 동향 보고서", pp.1-38, 2021 |
46 | 한국인터넷진흥원 (KISA), "2021년 2분기 랜섬웨어 동향 보고서", pp.1-37, 2021 |
47 | 보안뉴스, "https://www.boannews.com/media/view.asp?idx=100023&direct=mobile" |
48 | Cnet, "https://www.cnet.com/personal-finance/crypto/a-timeline-of-the-biggest-ransomware-attacks/" |
49 | Chuong Dong Security Blog, "http://chuongdong.com/reverse%20engineering/2021/01/03/BabukRansomware/" |
50 | ESTSecurity, "https://blog.alyac.co.kr/3770" |
51 | 보안뉴스, "https://www.boannews.com/media/view.asp?idx=98010" |
52 | Tesorion, "https://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/" |
53 | The Wall Street Journal, "https://www.wsj.com/articles/jbs-paid-11-million-to-resolve-ransomwareattack-11623280781" |
54 | Avast, "https://files.avast.com/files/decryptor/avast_decryptor_atomsilo.exe" |
55 | BleepingComputer, "https://www.bleepingcomputer.com/news/security/us-declares-state-of-emergency-after-ransomware-hits-largest-pipeline/" |
56 | Nomoreransome, "https://www.nomoreransom.org/en/decryption-tools.html#Lorenz" |
57 | Bitdefender, "https://www.bitdefender.com/blog/labs/bitdefender-offers-free-universal-decryptor-for-revil-sodinokibi-ransomware/" |
58 | Institute for Security and Technology, "https://securityandtechnology.org/ransomwaretaskforce/report/" |
59 | BleepingComputer, "https://www.bleepingcomputer.com/news/security/evil-corp-demands-40-million-in-new-macaw-ransomware-attacks/" |
60 | 연합뉴스, "https://www.yna.co.kr/view/AKR20210521125700017" |
61 | CARBIS BAY G7 SUMMIT COMMUNIQUE, "https://www.g7uk.org/wp-content/uploads/2021/06/Carbis-Bay-G7-Summit-Communique-PDF-430KB-25-pages-5.pdf" |
62 | U.S. DEPARTMENT of STATE, "https://www.state.gov/rewards-for-justice-reward-offer-for-information-on-foreign-malicious-cyber-activity-against-u-s-critical-infrastructure/" |
63 | CISA, https://us-cert.cisa.gov/ncas/alerts/aa21-243a |
64 | Canadian Centre for Cyber Security, "https://cyber.gc.ca/en/guidance/ransomware-how-prevent-and-recover-itsap00099" |
65 | CERTNZ, "https://www.cert.govt.nz/business/guides/protecting-from-ransomware/" |
66 | FBI FLASH, "https://www.cyber.nj.gov/alerts-advisories/conti-ransomware-attacks-impact-healthcare-and-first-responder-networks" |
67 | CISA, "https://us-cert.cisa.gov/ncas/alerts/aa21-291a" |
68 | Bitdefender, "https://labs.bitdefender.com/2021/01/darkside-ransomware-decryption-tool/" |