Question

In: Computer Science

Task: Read the case study below and answer the following questions. Case Study: The Reveton Ransomware...

Task: Read the case study below and answer the following questions.
Case Study: The Reveton Ransomware Attacks
In August 2012, the Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center, was inundated with reports of a new type of cybercrime. Victims across the United States reported that while searching the Internet, their computers locked up, and they received the following message, purportedly from the FBI: “This operating system is locked due to the violation of the federal laws of the United States of America! (Article 1, Section 8, Clause 8; Article 202; Article 210 of the Criminal Code of U.S.A. provides for a deprivation of liberty for four to twelve years.)” The message then accused the victim either of visiting pornography Web sites or of distributing copyrighted content. Victims were told they could unlock their computers and avoid prosecution by paying a fine of $200 within 72 hours of receiving the message. The message came replete with the official FBI logo.
The incident pointed to a steep rise in ransomware attacks. Ransomware is malware that disables a computer or smartphone until the victim pays a fee, or ransom. Unlike other viruses, the Reveton version of ransomware is not activated by opening a file or an attachment. Rather it is an example of “drive-by malware,” viruses that download automatically when a user visits an infected Web site.
The FBI immediately issued an alert, but within a month, cybersecurity experts had identified 16 variants of the ransomware. These viruses had infected 68,000 unique IP addresses. It is estimated that on an average day, about 170 victims paid the $200 fee and received valid unlock codes. The compromised computers could not be fixed through the installation or updating of antivirus software because the computer was locked. Because so many home PC owners fail to back up their systems regularly, many victims faced losing a significant amount of data. The $200 fee itself was low enough to encourage payment. A visit to a professional IT service to repair the damage could potentially cost the same amount and take more time to resolve. A quick payment through a prepaid money card system, such as MoneyPak, could save the victim a lot of trouble.
The United States was not the first country to be hit by these attacks. In early 2012, criminal gangs targeted France, Germany, and the United Kingdom. Ransomware attacks first broke out in Russia in 2009. Since that time, they have spread to almost every country on the globe, hitting the United States and Japan especially hard. Symantec, an IT security company, estimates that gangs are extorting over $5 million per year from online victims. The rise of ransomware attacks is, no doubt, due in part to their success. In France, for example, almost 4 percent of victims coughed up the ransom money during a non-Reveton scam.
The Reveton ransomware is delivered by the popular Russian-language Citadel malware toolkit. The latest version of Citadel can also grab passwords from Web browsers and change Web sites to trick users into handing over their login information.
In December 2012, the United Kingdom arrested three people they believed were involved in the Reveton ransomware attacks. Finding the perpetrators, however, is unusual and is not the most effective way to combat this crime. Law enforcement agencies and IT security companies have urged the public to take measures to prevent themselves from falling victim to such attacks—by keeping software such as Java, Acrobat Reader, Adobe Flash, Windows, and their browser software updated. An early Reveton ransomware attack made use of a vulnerability in a version of Java that had just been patched a month prior. Computer users can also avoid infections by using security software that identifies suspicious Web sites, and by not clicking online ads from dubious companies. Perhaps, however, the best way to avoid the spread of these attacks is to encourage victims to report the crime and to refuse to comply with the ransom demands.

Questions for the Homework
1-Why are ransomware attacks on the rise?
2-What can you do to prevent ransomware attacks on your own computer?
3-How do you think victims should respond to ransomware attacks?
4-Do the victims have an ethical obligation to future victims? If yes, why? If no, why?

Solutions

Expert Solution

1) Ransomware attack

A Ransomware is a malware which infect the computer software or lock the computer software which displays a demanding fee in order to work your system again. The attacker makes money by installing the deceptive links in an email message, instant message or website. It has an ability to lock a computer screen or encrypt important, predetermined files with a password.

There are many types of malware are present:

1. Scareware

It is a simple form of ransomware. You might receive a pop-up message claiming that malware was discovered.

2. Screen Lockers.

When lock-screen ransomware gets on your computer screen, which means that you are frozen out of your PC entirely.

3. Encrypting Ransomware.

Here the files are encrypted and the attacker demand for payment in order to decrypt or redeliver the system.

For the demanding of payment to decrypt the system the attacker have attracted in ransomware. With the development of ransom family reveton in 2012 came a new form of ransomware. Victim would be locked out of their desktop and shown an official looking page that included credential for law enforcement agencies like FBI and Interpol. The ransom would claim that the user had committed a crime such as computer hacking, downloading illegal files, or even being involved with child pornography. And they demand for paying money in various ranges and forms.

2) Prevent Ransomware Attack.

To prevent the ransomware attack, first we have to know our enemy. That is most of all organisations know what are all the ransom fell on the previous year. So be aware of ransom attack and avoid such situations and also don’t join such clubs.

And the major thing is, train your organisation and provide the aware toolkit of organisation.

And also, we deploy a world class protection to our system. to compromise these preventive measures a user may get attacked easily.

Avoid in by clicking the link in spam email or unfamiliar website. And also download the malicious link will affect the computer.

Do not open untrusted email attachments. Confirm the sender then only open the attachment. And also, never open attachment that ask you to enable macros to view them.

The other important thing is that you have to download the content from the trusted sites. Downloading from reputed site is the only option for user.

Never ever give the personal data to any untrustworthy sites.

3) Response to Ransomware Attack.

First, we have to block the ransomware communication. For that we can implement anti-bot technology to block ransomware and other form of malware connecting and communicating with our system.

Contain infections to prevent it from spreading, minimizing, business impact. So don’t panic with the situation, there is a solution to overcome it. Unfortunately, we are under threat of ransomware, then we have more options to over come the situation

4) Ethical Obligations to future victims.

There is any rule that the victim should respond or have obligations to the future. But for the ethical side of the person they have to be make awareness about the ransomware. It helps other persons to be careful for such situations. And get prepared for the future actions from the attacker.

***************†PLEASE DON'T FORGET TO GIVE THUMBS UP.. I REALLY NEED IT...


Related Solutions

Read the following case study and answer the questions.                                  &
Read the following case study and answer the questions.                                     1*6=6 RBC’s Youth Marketing Strategy As stated above, the marketing strategy consists of selecting a target market and designing the marketing mix of your product, price, place, and promotion to appeal to your competitors. RBC, Canada’s largest bank, obviously has many different target markets, which results in the key managing different marketing mixes. One key target market for the bank is university students and recent graduates. The group is particularly...
COST ACCOUNTING ASSIGNMENT – CASE STUDY Read the case study below and answer the questions that...
COST ACCOUNTING ASSIGNMENT – CASE STUDY Read the case study below and answer the questions that follow. Ma Baker produce a mini-kitchen called Small Cook, which is enjoying extensive popularity amongst young children. The following data is available for the month: Selling price (per unit) R116 Units in opening inventory 600 Units manufactured 2 550 Units sold 3 050 Units in closing inventory 100 Variable costs per unit: Direct materials R12,00 Direct labour R50,00 Variable manufacturing overhead R6,50 Variable selling...
Case Study- Read the case study scenario, answer the questions below, and explain the rationale for...
Case Study- Read the case study scenario, answer the questions below, and explain the rationale for your answer. Glenna, age 38, lost leg function during a motor vehicle accident at age 16. She plays basketball at the community center and teaches aerobic classes for wheelchair-bound people three times a week. She manages a medical equipment rental business since her husband died. Business is not profitable. A physician’s referral was made to the public health department for a developmental assessment. A...
Case Study- Read the case study scenario, answer the questions below, and explain the rationale for...
Case Study- Read the case study scenario, answer the questions below, and explain the rationale for your answer. Glenna, age 38, lost leg function during a motor vehicle accident at age 16. She plays basketball at the community center and teaches aerobic classes for wheelchair-bound people three times a week. She manages a medical equipment rental business since her husband died. Business is not profitable. A physician’s referral was made to the public health department for a developmental assessment. A...
Case Study – Psychology and Motivation Read the following case study and answer the questions that...
Case Study – Psychology and Motivation Read the following case study and answer the questions that follow:- Jennifer was diagnosed with dyslexia at the end of her first year of studying for a psychology degree. It has an impact on her ability to read journal articles and other text, do statistics, read, and take down numbers from slides. Despite these difficulties she’s just started a PhD in psychology, having obtained an excellent undergraduate degree through extremely hard work and determination:...
Read the case study. Then answer the questions at the end of the case study. The...
Read the case study. Then answer the questions at the end of the case study. The patient is a 60-year-old Caucasian female presenting to the emergency department with acute onset shortness of breath. Symptoms began approximately 2 days before and had progressively worsened with no associated, aggravating, or relieving factors noted. She had similar symptoms approximately 1 year ago requiring hospitalization. She uses BiPAP ventilatory support at night when sleeping. She denies fever, chills, cough, wheezing, and sputum production but...
Case Study Read the following case study and answer the questions that follow: Grace Speak is...
Case Study Read the following case study and answer the questions that follow: Grace Speak is a fourth-year student at Best University. She and her fellow classmates are working hard in their final courses and preparing for exams. Inspired by the teamwork that the healthcare profession espouses, Grace gets an idea for a study group. She thinks it will really help to share case experiences, course notes, and study tips. Unfortunately, several members of her peer group live out of...
QUESTION 4 CASE STUDY Read the following case study and then answer the questions. A market...
QUESTION 4 CASE STUDY Read the following case study and then answer the questions. A market darling falls to Earth: The EOH Meltdown Background EOH was listed on the JSE in 1997. Over the next twenty years it grew to one of the largest technology businesses on the African continent. By 2017 it operated in 36 countries in Africa and internationally. It had grown its annual turnover to R15,4 bn rand and was generally viewed as a highly successful company....
Case Study Read the following case study and answer the questions that follow: Grace Speak is...
Case Study Read the following case study and answer the questions that follow: Grace Speak is a fourth-year student at Best University. She and her fellow classmates are working hard in their final courses and preparing for exams. Inspired by the teamwork that the healthcare profession espouses, Grace gets an idea for a study group. She thinks it will really help to share case experiences, course notes, and study tips. Unfortunately, several members of her peer group live out of...
Read the case study below and answer the questions that follow: A leading construction company is...
Read the case study below and answer the questions that follow: A leading construction company is building an apartment building with five floors. Each story has four flats. Due to limited manpower availability, they want to outsource the maintenance management. Assume that you are a facility manager for that company. a. Explain how you would plan the daily maintenance activities of this building after its completion. The plan should include detailed information of the time, resource and budget requirements. The...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT