Ransomware Attacks in History of Cyber World
Ransomware Attacks in History of Cyber World
Ransomware Attacks in History of Cyber World
https://doi.org/10.22214/ijraset.2022.39758
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
Abstract: Technology advancement since last few decades creates cyber attack a critical issue. Cyber security has become an
important part today. It has also become an important and crucial subject in the field of forensic science. Increased in the
growth of internet technology and internet devices have increased the risk of cyber attack. Almost every organization today are
depends on the internet and devices. There are many types of cyber attack. This paper is the detailed review about Ransomware
attack. This paper is consisted about vast of the information about What is Ransomware Attack, how does it work, how
ransomware attack emerged. After reading this paper you will learn about the ransomware attacks in history of cyber world.
This will help you to learn and understand about ransomware attack, how to prevent yourself from ransomware attack. As a
forensic science student, it is always important to be aware about the attacks that have happened in the history of cyber world.
Before writing this paper, I have read and analyze many research paper and internet articles, so that I can write a detailed
review paper which can help students and for the forensic awareness.
Keywords: Cyberattack, Hacking, Ransomware, cyberworld, cyber security, ransomware, forensic, network security
I. INTRODUCTION
A. What is Malware?
Any Software which is developed by the hacker to damage, destroy or block the data is known as malware. These software’s are
consist of scripts which are written using programming languages. Some commonly known malwares are viruses, spyware, adware,
Ransomware, fileless malware.
B. What is Ransomware?
Ransome is a malware software which is used to retrieve sensitive data from a system. Using this malware practice all the storage,
files and even the device is encrypted. This can only be solve using the decryption. In such cases hacker demands to pay some
amount in the exchange of decryption key. The first case of ransomware was introduced in 1989, today ransomware have several
varieties. Ransomware varieties are increasing rapidly, which has advanced capability of spreading. Latest ransomware has
advanced spreading and development technique. They can develop themselves using crypters and apply reverse engineering which
make it very complicated to understanding and decrypt. Now a days, the use of offline encryption has increased, which make
ransomware one of the most dangerous malwares and a serious concern for the business and online system. Those attack are
advanced and more complicated and becoming more challenging day by day.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 39
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
Figure 2:- An example of spam link shared on E-mail for the Ransomware Attack
2) Messages: Yes, you see it right, injecting ransomware in your system is that easy. The codes can be share in your message
inbox. Even using facebook messager. The attacker create account with some random name or with the name of ‘friends. Using
that account the attacker will share that malware program.
3) Pop-ups: These days pop-ups are used to show advertisement. But very few know those pop-ups are used in most of the
hacking practice. Because it was a creative practice to share forcefully any data.
4) By Downloading File from Unknown Source: If you search for free movie download or song download, you can see thousands
of website. By downloading unknown file or file from unknown source you can welcome ransomware in your system.
Figure 3:- One of the disk used in AIDS Trojan attack(first Ransomware attack).
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 40
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
After 90 times turning on the system the program run automatically and display a message “user’s license to use a certain piece of
software had expired” and ask to pay an amount of $189 to an account register with the name of PC CYBORG CORPORATION.
Later Popp was declared mentally unfit, and he promised to donate the amount in AIDS research fund. However, It was not required
to pay because in this attack only file name was encrypted. This was the first register case of ransomware attack in the cyber world.
After this the ransomware attack highlighted.
2) 1996: In 1996 another ransomware attack was introduced. This time the attacker used RSA (Rivest-Shamir-Adleman) and TSA
(Tiny Encryption Algorithm) which encrypt the victim’s data. This virus contains the encrypted key which block the access of
files and the required decrypted key (which decrypt the virus and allow all access to the user) was keep private to the user. Such
type of attacks were commonly used in cyber world till the mid-2000s, where new different variant was used for the attack
based on the same scenario.
3) 2010: In august 2010, a non-encrypting ransomware was found, when Russia arrested few people who build a ransomware
trojan “Winlock”. This ransomware doesn’t have any decryption code. User need to pay around $10 to receive a SMS code that
is need to enter to unlock the system. This non-encrypting ransomware hit thousand of people across Russia and many other
countries. According to a report earning of this group was around $16 million. In 2011 a similar case was reported where
hacker asks for 6-digit code to unlock the system.
4) 2013: In 2013 a new evolution gets started, where a 21-year-old man was a victim from Virginia. The victim was blackmailed
by showing him his private communication. This is the time when first ransomware case where they use FBI logo was
introduced. This virus was known as FBI MoneyPak Ransomware. FBI published an advice to not to pay the money and it was
not from official FBI. Some other attackers are using their logo and asking people for money.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 41
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
Figure 5:- The Average cost of Ransomware caused downtime per incident
Ransomware can stop a productivity, reduce efficiency, it is always important to be aware about cyber-attack and especially for
ransomware.
VII. CONCLUSION
It can be clearly stated that no cybercrime occurs without a loophole. It you keep yourself with latest updates and aware yourself
about the network and security you can protect yourself. From the first case to latest case the ransomware was injected into a system
using an unknown source. Before writing this paper, I have analyzed and study many research papers, internet articles and take
expert advice. It is always important to know your work and motive this will keep you protect and your device. Never forget to
backup your data, if you become a ransomware victim than you can backup your files and defeat the attack this was the best solution
in such cases. Always keep update your device, software.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 42
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
REFERENCES
[1] A study on Ransomware and its Effect on India and Rest of the world – Naveen Kumar C.G, Dr, Sanjay Pande M.B (IJERT)
[2] Ransomware Threats – Nagarajan Seshadri (IJERT)
[3] Ransomware Evolution, Target and safety measures 2018 – researchgate.net
[4] A history of Ransomware Attacks – Digitalguardian.com
[5] Ransomware, List of cyberattacks – en.wikepedia.org
[6] What is Ransomware – Proofpoint.com
[7] What is Malware – cisco.com
[8] Ransomware: A Research and a personal case study of dealing with this nasty malware – Azad Ali (IISIT.org)
[9] Ransomware Evolution, Target and Safety Measures – Researchgate.net
[10] An empirical study of ransomware attacks on organizations by Lena Yuryna Connolly, David S Wall, Michael Lang, Bruce Oddson – academic.oup.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 43