Attacking Key Management in Ransomware
Title | Attacking Key Management in Ransomware |
Publication Type | Journal Article |
Year of Publication | 2020 |
Authors | Bajpai, P., Enbody, R. |
Journal | IT Professional |
Volume | 22 |
Pagination | 21—27 |
ISSN | 1941-045X |
Keywords | attacking key management, Chained Attacks, Computer crime, concerning trends, dynamically extracting decryption keys, Encryption, extracted keys, invasive software, memory attacks, NIST, opportunistic attackers, private sector entities, pubcrawl, Public key, public key cryptography, public sector entities, ransomware, ransomware kill chain, real-world ransomware, resilience, Resiliency, Scalability, steady growth, targeted attacks |
Abstract | Ransomware have observed a steady growth over the years with several concerning trends that indicate efficient, targeted attacks against organizations and individuals alike. These opportunistic attackers indiscriminately target both public and private sector entities to maximize gain. In this article, we highlight the criticality of key management in ransomware's cryptosystem in order to facilitate building effective solutions against this threat. We introduce the ransomware kill chain to elucidate the path our adversaries must take to attain their malicious objective. We examine current solutions presented against ransomware in light of this kill chain and specify which constraints on ransomware are being violated by the existing solutions. Finally, we present the notion of memory attacks against ransomware's key management and present our initial experiments with dynamically extracting decryption keys from real-world ransomware. Results of our preliminary research are promising and the extracted keys were successfully deployed in subsequent data decryption. |
DOI | 10.1109/MITP.2020.2977285 |
Citation Key | bajpai_attacking_2020 |
- pubcrawl
- targeted attacks
- steady growth
- Scalability
- Resiliency
- resilience
- real-world ransomware
- ransomware kill chain
- Ransomware
- public sector entities
- public key cryptography
- Public key
- attacking key management
- private sector entities
- opportunistic attackers
- NIST
- memory attacks
- invasive software
- extracted keys
- encryption
- dynamically extracting decryption keys
- concerning trends
- Computer crime
- Chained Attacks