Visible to the public Attacking Key Management in Ransomware

TitleAttacking Key Management in Ransomware
Publication TypeJournal Article
Year of Publication2020
AuthorsBajpai, P., Enbody, R.
JournalIT Professional
Volume22
Pagination21—27
ISSN1941-045X
Keywordsattacking key management, Chained Attacks, Computer crime, concerning trends, dynamically extracting decryption keys, Encryption, extracted keys, invasive software, memory attacks, NIST, opportunistic attackers, private sector entities, pubcrawl, Public key, public key cryptography, public sector entities, ransomware, ransomware kill chain, real-world ransomware, resilience, Resiliency, Scalability, steady growth, targeted attacks
Abstract

Ransomware have observed a steady growth over the years with several concerning trends that indicate efficient, targeted attacks against organizations and individuals alike. These opportunistic attackers indiscriminately target both public and private sector entities to maximize gain. In this article, we highlight the criticality of key management in ransomware's cryptosystem in order to facilitate building effective solutions against this threat. We introduce the ransomware kill chain to elucidate the path our adversaries must take to attain their malicious objective. We examine current solutions presented against ransomware in light of this kill chain and specify which constraints on ransomware are being violated by the existing solutions. Finally, we present the notion of memory attacks against ransomware's key management and present our initial experiments with dynamically extracting decryption keys from real-world ransomware. Results of our preliminary research are promising and the extracted keys were successfully deployed in subsequent data decryption.

DOI10.1109/MITP.2020.2977285
Citation Keybajpai_attacking_2020