Researchers develop a way to stop ransomware
Ransomware – what hackers use to encrypt your computer files and demand money in exchange for freeing those contents – is an exploding global problem with few solutions, but a team of University of Florida researchers says it has developed a way to stop it dead in its tracks.
The answer, they say, lies not in keeping it out of a computer but rather in confronting it once it’s there and, counterintuitively, actually letting it lock up a few files before clamping down on it.
“Our system is more of an early-warning system. It doesn’t prevent the ransomware from starting … it prevents the ransomware from completing its task … so you lose only a couple of pictures or a couple of documents rather than everything that’s on your hard drive, and it relieves you of the burden of having to pay the ransom,” said Nolen Scaife, a UF doctoral student and founding member of UF’s Florida Institute for Cybersecurity Research.
Scaife is part of the team that has come up with the ransomware solution, which it calls CryptoDrop.
Ransomware attacks have become one of the most urgent problems in the digital world. The FBI issued a warning in May saying the number of attacks has doubled in the past year and is expected to grow even more rapidly this year.
It said it received more than 2,400 complaints last year and estimated losses from such attacks at $24 million last year for individuals and businesses.
Attackers are typically shadowy figures from other countries lurking on the Dark Web and difficult, if not impossible, to find. Victims include not only individuals but also governments, industry, health care providers, educational institutions and financials entities.
Attacks most often show up in the form of an email that appears to be from someone familiar. The recipient clicks on a link in the email and unknowingly unleashes malware that encrypts his or her data. The next thing to appear is a message demanding the ransom, typically anywhere from a few hundred to a few thousand dollars.
“It’s an incredibly easy way to monetize a bad use of software,” said Patrick Traynor, an associate professor in UF’s department of computer and information science and engineering at UF and also a member of the Florida Institute for Cybersecurity Research. He and Scaife worked together on developing CryptoDrop.
Some companies have simply resigned themselves to that inevitability and budgeted money to cover ransoms, which usually must be paid in Bitcoin, a digital currency that defies tracing.
Ransomware attacks are effective because, quite simply, they work.
Antivirus software is successful at stopping them when it recognizes ransomware malware, but therein lies the problem.
“These attacks are tailored and unique every time they get installed on someone’s system,” Scaife said. “Antivirus is really good at stopping things it’s seen before … That’s where our solution is better than traditional anti-viruses. If something that’s benign starts to behave maliciously, then what we can do is take action against that based on what we see is happening to your data. So we can stop, for example, all of your pictures form being encrypted.”
Scaife, Traynor and colleagues Kevin Butler at UF and Henry Carter at Villanova University lay out the solution in a paper accepted for publication at the IEEE International Conference on Distributed Computing Systems and scheduled to be presented June 29 in Nara, Japan.
The results, they said, were impressive.
“We ran our detector against several hundred ransomware samples that were live,” Scaife said, “and in those case it detected 100 percent of those malware samples and it did so after only a median of 10 files were encrypted.”
And CryptoDrop works seamlessly with antivirus software.
“About one-tenth of 1 percent of the files were lost,” Traynor said, “but the advantage is that it’s flexible. We don’t have to wait for that anti-virus update. If you have a new version of your ransomware, our system can detect that.”
The team currently has a functioning prototype that works with Windows-based systems and is seeking a partner to commercialize it and make it available publicly.
Learn more:Â Extortion extinction
The Latest on: Ransomware
[google_news title=”” keyword=”Ransomware” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Ransomware
- Smashing Security podcast #369: Keeping the lights on after a ransomware attackon April 24, 2024 at 4:01 pm
Leicester City Council suffers a crippling ransomware attack, and a massive data breach, but is it out of the dark yet? And as election fever hits India we take a close eye at deepfakery.
- Booze Shortage Expected After Major Liquor Distributor Hit With a Ransomware Attackon April 24, 2024 at 2:56 pm
The Record reported on Wednesday that a ransomware attack on a Swedish liquor distribution company that has a monopoly in the country might lead to empty shelves at liquor stores by Friday. The ...
- Avoiding Shutdowns from Ransomware Attackson April 24, 2024 at 12:48 pm
Since 2010, all but one manufacturing incident was ransomware-induced. Since 2019, attacks with real-world consequences have gone from a handful of annual incidents in the last decade, to yearly ...
- Coalition reveals uptick in cyber insurance claims driven by ransomware in 2023on April 24, 2024 at 10:00 am
Coalition was also successful last year in “clawing back” stolen funds, recovering more than $38 million in fraudulent transfers during 2023. The ability to get money back is noted as demonstrating ...
- Improved ransomware attack response aimed by Veeam’s Coveware purchaseon April 24, 2024 at 8:47 am
SiliconAngle reports that cyber incident response provider Coveware has been purchased by Veeam in a bid to improve response to ransomware attacks.
- Hackers are using developing countries for ransomware practiceon April 24, 2024 at 6:26 am
Recent ransomware targets include a Senegalese bank, a financial services company in Chile, a tax firm in Colombia, and a government economic agency in Argentina, which were hit as part of gangs’ dry ...
- Dallas’ head of IT resigns; Bill Zielinski oversaw recovery from 2023 ransomware attackon April 24, 2024 at 6:00 am
Dallas’ chief information officer, who in recent years oversaw the city’s response to a ransomware attack and an employee deleting millions of electronic police records, is resigning. Bill Zielinski ...
- Ransomware Groups are Rebranding — As ‘Services’on April 23, 2024 at 11:44 pm
Techopedia explores the alarming trend of ransomware groups rebranding themslves from villains to heroes — even becoming professional.
- Dark web inundated by cheap ransomware toolson April 23, 2024 at 5:00 pm
Nineteen inexpensive one-time-use ransomware tools akin to "junk guns" proliferating on the dark web between June 2023 and February 2024 have reduced the barrier to entry for ransomware attacks for ...
- 9 out 10 made at least one ransomware paymenton April 23, 2024 at 11:14 am
A survey found that not only are ransomware attacks growing dramatically, 90% of IT decision makers have made at least one payment in the last year.
via Bing News