Question

In: Computer Science

Case Study: The Reveton Ransomware Attacks In August 2012, the Internet Crime Complaint Center (IC3), a...

Case Study: The Reveton Ransomware Attacks

In August 2012, the Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center, was inundated with reports of a new type of cybercrime. Victims across the United States reported that while searching the Internet, their computers locked up, and they received the following message, purportedly from the FBI: “This operating system is locked due to the violation of the federal laws of the United States of America! (Article 1, Section 8, Clause 8; Article 202; Article 210 of the Criminal Code of U.S.A. provides for a deprivation of liberty for four to twelve years.)” The message then accused the victim either of visiting pornography Web sites or of distributing copyrighted content. Victims were told they could unlock their computers and avoid prosecution by paying a fine of $200 within 72 hours of receiving the message. The message came replete with the official FBI logo.

The incident pointed to a steep rise in ransomware attacks. Ransomware is malware that disables a computer or smartphone until the victim pays a fee, or ransom. Unlike other viruses, the Reveton version of ransomware is not activated by opening a file or an attachment. Rather it is an example of “drive-by malware,” viruses that download automatically when a user visits an infected Web site.

The FBI immediately issued an alert, but within a month, cybersecurity experts had identified 16 variants of the ransomware. These viruses had infected 68,000 unique IP addresses. It is estimated that on an average day, about 170 victims paid the $200 fee and received valid unlock codes. The compromised computers could not be fixed through the installation or updating of antivirus software because the computer was locked. Because so many home PC owners fail to back up their systems regularly, many victims faced losing a significant amount of data. The $200 fee itself was low enough to encourage payment. A visit to a professional IT service to repair the damage could potentially cost the same amount and take more time to resolve. A quick payment through a prepaid money card system, such as MoneyPak, could save the victim a lot of trouble.

The United States was not the first country to be hit by these attacks. In early 2012, criminal gangs targeted France, Germany, and the United Kingdom. Ransomware attacks first broke out in Russia in 2009. Since that time, they have spread to almost every country on the globe, hitting the United States and Japan especially hard. Symantec, an IT security company, estimates that gangs are extorting over $5 million per year from online victims. The rise of ransomware attacks is, no doubt, due in part to their success. In France, for example, almost 4 percent of victims coughed up the ransom money during a non-Reveton scam.

The Reveton ransomware is delivered by the popular Russian-language Citadel malware toolkit. The latest version of Citadel can also grab passwords from Web browsers and change Web sites to trick users into handing over their login information.

In December 2012, the United Kingdom arrested three people they believed were involved in the Reveton ransomware attacks. Finding the perpetrators, however, is unusual and is not the most effective way to combat this crime. Law enforcement agencies and IT security companies have urged the public to take

measures to prevent themselves from falling victim to such attacks—by keeping software such as Java, Acrobat Reader, Adobe Flash, Windows, and their browser software updated. An early Reveton ransomware attack made use of a vulnerability in a version of Java that had just been patched a month prior. Computer users can also avoid infections by using security software that identifies suspicious Web sites, and by not clicking online ads from dubious companies. Perhaps, however, the best way to avoid the spread of these attacks is to encourage victims to report the crime and to refuse to comply with the ransom demands.

Questions:

  1. Why are ransomware attacks on the rise?
  2. What can you do to prevent ransomware attacks on your own computer?
  3. How do you think victims should respond to ransomware attacks?
  4. Do the victims have an ethical obligation to future victims? If yes, why? If no, why?

Solutions

Expert Solution

1) Ransomware attack

A Ransomware is a malware which infect the computer software or lock the computer software which displays a demanding fee in order to work your system again. The attacker makes money by installing the deceptive links in an email message, instant message or website. It has an ability to lock a computer screen or encrypt important, predetermined files with a password.

There are many types of malware are present:

1. Scareware

It is a simple form of ransomware. You might receive a pop-up message claiming that malware was discovered.

2. Screen Lockers.

When lock-screen ransomware gets on your computer screen, which means that you are frozen out of your PC entirely.

3. Encrypting Ransomware.

Here the files are encrypted and the attacker demand for payment in order to decrypt or redeliver the system.

For the demanding of payment to decrypt the system the attacker have attracted in ransomware. With the development of ransom family reveton in 2012 came a new form of ransomware. Victim would be locked out of their desktop and shown an official looking page that included credential for law enforcement agencies like FBI and Interpol. The ransom would claim that the user had committed a crime such as computer hacking, downloading illegal files, or even being involved with child pornography. And they demand for paying money in various ranges and forms.

2) Prevent Ransomware Attack.

To prevent the ransomware attack, first we have to know our enemy. That is most of all organisations know what are all the ransom fell on the previous year. So be aware of ransom attack and avoid such situations and also don’t join such clubs.

And the major thing is, train your organisation and provide the aware toolkit of organisation.

And also, we deploy a world class protection to our system. to compromise these preventive measures a user may get attacked easily.

Avoid in by clicking the link in spam email or unfamiliar website. And also download the malicious link will affect the computer.

Do not open untrusted email attachments. Confirm the sender then only open the attachment. And also, never open attachment that ask you to enable macros to view them.

The other important thing is that you have to download the content from the trusted sites. Downloading from reputed site is the only option for user.

Never ever give the personal data to any untrustworthy sites.

3) Response to Ransomware Attack.

First, we have to block the ransomware communication. For that we can implement anti-bot technology to block ransomware and other form of malware connecting and communicating with our system.

Contain infections to prevent it from spreading, minimizing, business impact. So don’t panic with the situation, there is a solution to overcome it. Unfortunately, we are under threat of ransomware, then we have more options to over come the situation

4) Ethical Obligations to future victims.

There is any rule that the victim should respond or have obligations to the future. But for the ethical side of the person they have to be make awareness about the ransomware. It helps other persons to be careful for such situations. And get prepared for the future actions from the attacker.


Related Solutions

Case Study 7: The Future of the Crossroads Center Read the Crossroads Center case and answer...
Case Study 7: The Future of the Crossroads Center Read the Crossroads Center case and answer the following question: 1)How would you design a future search conference, strategic planning session, or scenario planning engagement for the client? The Crossroads Center was founded 16 years ago as a nonprofit drug and alcohol treatment center for adults and adolescents. The center is located in a quiet rural area about an hour from a major urban center. It consists of six separate cream-colored...
Muscle & Neurotransmitter Case Study (CS2) Name: Case Study: Muscle Weakness Chief Complaint: A 26-year-old woman...
Muscle & Neurotransmitter Case Study (CS2) Name: Case Study: Muscle Weakness Chief Complaint: A 26-year-old woman with muscle weakness in the face. Patient Presentation: A 26-year-old woman with muscle weakness in the face. Patient History: Jill Rothman, a 26-year-old gymnastics instructor, presents with complaints of muscle weakness in her face that comes and goes, and has been getting worse over the past two months. Her symptoms get worse by the end of an active day. Most notably, she complains that...
Case Study #2 Don Briggs, RN, is the case manager for a rehabilitation center that is...
Case Study #2 Don Briggs, RN, is the case manager for a rehabilitation center that is part of a large hospital system that also owns a home health agency, a hospital, an outpatient surgery center, and a network of primary care clinics. The executives of the hospital system have committed to putting an electronic health record (EHR) system in place within the next 3 years. Their vision is to have a system in which patient information can be shared across...
The Center for Internet & Society at Harvard recently conducted a study analyzing the privacy management...
The Center for Internet & Society at Harvard recently conducted a study analyzing the privacy management habits of teen internet users. In a group of 50 teens, 13 reported having more than 500 friends on Face-book. Use the “plus four” method to find a 90% confidence interval for the true proportion of teens who would report having more than 500 Face-book friends. What is the size of the sample n: What is the number of students reported having friends x...
NATIONAL CENTER FOR CASE STUDY TEACHING IN SCIENCE Take a Deep Breath: A Case of Respiratory...
NATIONAL CENTER FOR CASE STUDY TEACHING IN SCIENCE Take a Deep Breath: A Case of Respiratory Illness by Brianna S. Nelson, Kelsey N. Aguirre, Alee L. Adams, Emily E. Brodbeck, and Breanna N. Harris Department of Biological Sciences Texas Tech University, Lubbock, TX Part I – Symptoms Callie was 26 years old when she opened a bakery called “Callie’s Cupcakes” in downtown San Francisco with her fiancé, Jeremy. Despite the competitive market, her business was booming; everyone loved the clever...
Case study Chief Complaint “It feels like an elephant is sitting on my chest! I’m too...
Case study Chief Complaint “It feels like an elephant is sitting on my chest! I’m too young to die!” HPI Larry Stanton is a 46-year-old man transported by paramedics to the ED of a large community hospital. He presents with severe, substernal chest pain for the last 6 hours. He states he was fine until about an hour after he ate breakfast. The pain radiates to his jaw and neck and is accompanied by N/V and diaphoresis. In the ambulance,...
In February 2012, the Pepsi Next product was launched into the US market. This case study...
In February 2012, the Pepsi Next product was launched into the US market. This case study provides students with an interesting insight into PepsiCo’s new product process and some of the challenging decisions that they faced along the way. Pepsi Next Case Study Introduction Pepsi Next was launched by PepsiCo into the US market in February 2012, and has since been rolled out to various international markets (for instance, it was launched in Australia in September 2012). The new product...
Please read the case study entitled “Casinos and Crime” that you find in the reading assignment....
Please read the case study entitled “Casinos and Crime” that you find in the reading assignment. Based on what you have learned in this unit, answer the following questions: 1. In most casino states and counties, laws protect owners from liability claims arising from problems caused by gambling. In ethical terms, however, if you’re the sole proprietor of the casino, do you feel any responsibility for this episode? Why or why not? If you feel any responsibility, to whom would...
CASE STUDY A 20-year-old construction worker called into the company clinic with a complaint of low-grade...
CASE STUDY A 20-year-old construction worker called into the company clinic with a complaint of low-grade fever, malaise, and headache. He was told to take two aspirins every four hours and get back to work. He came in 3 days later. His headache had never completely gone away and was now much worse. His fever was now 40.3°C. In addition, he had developed photophobia and a stiff neck. The stiff neck accompanied by a headache get the young man immediate...
Zara case study. not from internet. Describe with own words and give examples
Zara case study. not from internet. Describe with own words and give examples
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT