• Title/Summary/Keyword: 랜섬웨어

Search Result 100, Processing Time 0.033 seconds

랜섬웨어를 이용한 암호화폐 탈취 및 자금세탁 방법에 대한 대응방안 연구 동향 분석

  • Jo, Uk;Kim, GuemBo;Heo, ShinWook;Kim, Howon
    • Review of KIISC
    • /
    • v.32 no.3
    • /
    • pp.19-26
    • /
    • 2022
  • 스마트컨트랙트를 사용하는 블록체인 2세대를 넘어오면서 블록체인 생태계는 지속적으로 성장하고 있으며, 블록체인 플랫폼 내에서 자체 발행되는 암호화폐는 다양한 수익 상품들(ICO, DeFi, NFT, Staking 등)을 등장시켰다. 암호화폐가 실물 화폐를 대체할 새로운 대안이라고 여겨지고 있지만, 최근 암호화폐를 악용한 범죄가 증가하고 있다. 특히 시스템을 감염시켜 몸값을 요구하는 랜섬웨어의 경우 기존의 현금을 요구하기보다 자금 세탁에 용이한 암호화폐로 요구하는 빈도가 증가하고 있다. 암호화폐의 경우 손쉽게 믹싱 서비스를 받을 수 있으며, 블록체인의 특성상 모든 트랜잭션을 확인할 수 있음 제3의 신뢰기관이 존재하지 않으며 모든 네트워크는 계좌로 연결되기 때문에 익명성이 보장되어 범죄자들이 자금세탁에 이용하고 있다. 본 논문을 통해 랜섬웨어에 사용되는 암호화폐 자금세탁 사례를 살펴보고 자금 세탁 시 사용되는 믹싱 서비스에 대해서 분석했다. 또한 불법 자금세탁을 식별하기 위한 기술적 연구 동향에 대해서 분석하였다.

FAIR-Based BIA for Ransomware Attacks in Financial Industry (금융 산업에서 발생하는 랜섬웨어 공격에 대한 FAIR 기반의 손실 측정 모델 분석)

  • Yoon, Hyun-sik;Song, Kyung-hwan;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.873-883
    • /
    • 2017
  • As Ransomware spreads, the target of the attack shifted from a single personal to organizations which lead attackers to be more intelligent and systematic. Thus, Ransomware's threats to domestic infrastructure, including the financial industry, have grown to a level that cannot be ignored. As a measure against these security issues, organizations use ISMS, which is an information protection management system. However, it is difficult for management to make decisions on the loss done by the security issues since amount of the damage done can not be calculated with just ISMS. In this paper, through FAIR-based loss measurement model based on scenario's to identify the extent of damage and calculate the reasonable damages which has been considered to be the problem of the ISMS, we identified losses and risks of Ransomeware on the financial industry and method to reduce the loss by applying the current ISMS and ISO 27001 control items rather than modifying the ISMS.

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

Ransomware Prevention and Steganography Security Enhancement Technology Using Format Preserving Encryption (형태보존암호화를 이용한 랜섬웨어 방지 및 스테가노그래피 보안강화기술)

  • Lim, Ji-hwan;Na, Gwan-Woo;Woo, Jae-Min;Seo, Hwa-joeng
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.805-811
    • /
    • 2018
  • Recently, Format-Preserving-Encryption (FEA) was suggested by the National Security Research institute (NSR) as an encryption method while maintaining the format without a distortion to the intended information to be encrypted. In this paper, we propose a scheme to solve conventional cyber security problems by using FEA scheme. First, we present the method to encrypt signatures and extensions with FEA in order to effectively defend against Ransomeware attacks. This technique can mitigate the exposure to the Ransomeware by encrypting the minimum information. Second, in order to reduce the secret information for Steganography, we introduce a new way to minimize the secret information with FEA. Finally, we compare the operation speed by encryption with FEA and Lightweight Encryption Algorithm (LEA), furthermore when we optimize FEA we want to compare with the performance improvement accompanying with it.

Methodology for Intercepting the Ransomware Attacks Using File I/O Intervals (파일 I/O Interval을 이용한 랜섬웨어 공격 차단 방법론)

  • Youn, Jung-moo;Jo, Je-geong;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.645-653
    • /
    • 2016
  • Ransomware was first created in 1999, but its existence become widely known in Korean by 2015. As information and communication technology have developed, the storage capacity of computer has enlarged, it accordingly is getting more important to effectively manage these information, rather than the information itself. In such situation, the ransomware break into other people's computer and encrypt an files without a user's permission. So, it adversely affect the user. In this paper, we monitor an access of a specific process to the file. And on the basis of this monitoring information, we detect whether the abnormal approach happened. Through the detection result, we block the permission about access to the file for a specific process. Using this method, we propose a blocking technique for the ransomeware's abnormal approach and encryption to the files.

A study on the improvement ransomware detection performance using combine sampling methods (혼합샘플링 기법을 사용한 랜섬웨어탐지 성능향상에 관한 연구)

  • Kim Soo Chul;Lee Hyung Dong;Byun Kyung Keun;Shin Yong Tae
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.69-77
    • /
    • 2023
  • Recently, ransomware damage has been increasing rapidly around the world, including Irish health authorities and U.S. oil pipelines, and is causing damage to all sectors of society. In particular, research using machine learning as well as existing detection methods is increasing for ransomware detection and response. However, traditional machine learning has a problem in that it is difficult to extract accurate predictions because the model tends to predict in the direction where there is a lot of data. Accordingly, in an imbalance class consisting of a large number of non-Ransomware (normal code or malware) and a small number of Ransomware, a technique for resolving the imbalance and improving ransomware detection performance is proposed. In this experiment, we use two scenarios (Binary, Multi Classification) to confirm that the sampling technique improves the detection performance of a small number of classes while maintaining the detection performance of a large number of classes. In particular, the proposed mixed sampling technique (SMOTE+ENN) resulted in a performance(G-mean, F1-score) improvement of more than 10%.

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.

A study of restricting read/write permission of the selecitve file from file encryption ransomeware (파일의 읽기/쓰기 권한 제한을 통한 암호화 랜섬웨어로부터 선택적 파일보호 연구)

  • Kim, Jae-hong;Na, Jung-chan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.234-237
    • /
    • 2017
  • 정보화 사회가 도래함에 따라 정보를 가공, 처리 유통하는 활동이 주를 이루고 정보의 가치는 경제적 가치를 창출하는 요소로 연결됐다. 이와 맞물려 ICT(Information & Communication Technology) 산업이 발전함에 따라 정보를 디지털 데이터 형식으로 저장관리 한다. 이러한 이유로 디지털 정보를 노리는 악성 행위들이 디지털 세상에서 문제가 되고 있다. 그중 사용자의 동의 없이 컴퓨터에 불법으로 설치되어 사용자의 디지털 파일(정보)를 인질로 잡아 금전적인 요구를 하는 악성 프로그램인 랜섬웨어의 피해는 날로 증가하고 있다.[1]. 본 논문에서는 운영체제의 시스템 콜 후킹을 통한 읽기/쓰기 권한을 제한함으로써 다양한 종류의 랜섬웨어 중 파일 암호화 기반 랜섬웨어로부터 사용자가 선택적으로 파일을 보호할 수 있는 방안을 제시하려 한다.

Propagation Modeling of WannaCryptor Wormable Malware (WannaCryptor 워머블 악성코드 확산 방식 연구)

  • Park, Tae Hwan;Lee, Howoong;Shin, Weon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.389-396
    • /
    • 2020
  • WannaCryptor is a type of ransomware which encrypts users' personal data or files and demands ransom payment in order to regain access. But it peculiarly spreads by itself like a Internet worm using Windows vulnerabilities of shared folder. In this paper, we analyzed and estimated the spread of WannaCryptor focusing on the wormable spread features different from the existed ransomware. Thus we observed its behaviors in virtual environments, and experimented the various spreads of WannaCryptor based on our prediction modeling.