Ransomware | references

References

  1. ^ a b c d e f g Young, A.; M. Yung (1996). Cryptovirology: extortion-based security threats and countermeasures. IEEE Symposium on Security and Privacy. pp. 129–140. 10.1109/SECPRI.1996.502676. ISBN 0-8186-7417-2. 
  2. ^ a b Jack Schofield (28 July 2016). "How can I remove a ransomware infection?". The Guardian. Retrieved 28 July 2016. 
  3. ^ Michael Mimoso (28 March 2016). "Petya Ransomware Master File Table Encryption". threatpost.com. Retrieved 28 July 2016. 
  4. ^ Justin Luna (21 September 2016). "Mamba ransomware encrypts your hard drive, manipulates the boot process". Neowin. Retrieved 5 November 2016. 
  5. ^ a b c d e Dunn, John E. "Ransom Trojans spreading beyond Russian heartland". TechWorld. Retrieved 10 March 2012. 
  6. ^ a b "New Internet scam: Ransomware..." FBI. 9 August 2012. 
  7. ^ a b "Citadel malware continues to deliver Reveton ransomware..." Internet Crime Complaint Center (IC3). 30 November 2012. 
  8. ^ "Update: McAfee: Cyber criminals using Android malware and ransomware the most". InfoWorld. Retrieved 16 September 2013. 
  9. ^ a b "Cryptolocker victims to get files back for free". BBC News. 6 August 2014. Retrieved 18 August 2014. 
  10. ^ a b "FBI says crypto ransomware has raked in >$18 million for cybercriminals". Ars Technica. Retrieved 25 June 2015. 
  11. ^ a b Young, Adam L.; Yung, Moti (2017). "Cryptovirology: The Birth, Neglect, and Explosion of Ransomware". 60 (7). Communications of the ACM: 24–26. Retrieved 27 June 2017. 
  12. ^ a b "Ransomware squeezes users with bogus Windows activation demand". Computerworld. Retrieved 9 March 2012. 
  13. ^ a b "Police warn of extortion messages sent in their name". Helsingin Sanomat. Retrieved 9 March 2012. 
  14. ^ a b McMillian, Robert. "Alleged Ransomware Gang Investigated by Moscow Police". PC World. Retrieved 10 March 2012. 
  15. ^ "Ransomware: Fake Federal German Police (BKA) notice". SecureList (Kaspersky Lab). Retrieved 10 March 2012. 
  16. ^ "And Now, an MBR Ransomware". SecureList (Kaspersky Lab). Retrieved 10 March 2012. 
  17. ^ Adam Young (2005). Zhou, Jianying; Lopez, Javier, eds. "Building a Cryptovirus Using Microsoft's Cryptographic API". Information Security: 8th International Conference, ISC 2005. Springer-Verlag. pp. 389–401. 
  18. ^ Young, Adam (2006). "Cryptoviral Extortion Using Microsoft's Crypto API: Can Crypto APIs Help the Enemy?". International Journal of Information Security. Springer-Verlag. 5 (2): 67–76. 10.1007/s10207-006-0082-7. 
  19. ^ Danchev, Dancho (22 April 2009). "New ransomware locks PCs, demands premium SMS for removal". ZDNet. Retrieved 2 May 2009. 
  20. ^ "Ransomware plays pirated Windows card, demands $143". Computerworld. Retrieved 9 March 2012. 
  21. ^ Cheng, Jacqui (18 July 2007). "New Trojans: give us $300, or the data gets it!". Ars Technica. Retrieved 16 April 2009. 
  22. ^ a b c "You're infected—if you want to see your data again, pay us $300 in Bitcoins". Ars Technica. Retrieved 23 October 2013. 
  23. ^ a b "CryptoDefense ransomware leaves decryption key accessible". Computerworld. IDG. Retrieved 7 April 2014. 
  24. ^ "What to do if Ransomware Attacks on your Windows Computer?". Techie Motto. Archived from the original on 23 May 2016. Retrieved 25 April 2016. 
  25. ^ Parker, Luke (9 June 2016). "Large UK businesses are holding bitcoin to pay ransoms". Retrieved 9 June 2016. 
  26. ^ Kassner, Michael. "Ransomware: Extortion via the Internet". TechRepublic. Retrieved 10 March 2012. 
  27. ^ Sebastiaan von Solms; David Naccache. "On Blind 'Signatures and Perfect Crimes" (PDF). Pdfs.sematicscholar.org. Retrieved 25 October 2017. 
  28. ^ Schaibly, Susan (26 September 2005). "Files for ransom". Network World. Retrieved 17 April 2009. 
  29. ^ Leyden, John (24 July 2006). "Ransomware getting harder to break". The Register. Retrieved 18 April 2009. 
  30. ^ Naraine, Ryan (6 June 2008). "Blackmail ransomware returns with 1024-bit encryption key". ZDNet. Retrieved 3 May 2009. 
  31. ^ Lemos, Robert (13 June 2008). "Ransomware resisting crypto cracking efforts". SecurityFocus. Retrieved 18 April 2009. 
  32. ^ Krebs, Brian (9 June 2008). "Ransomware Encrypts Victim Files with 1,024-Bit Key". The Washington Post. Retrieved 16 April 2009. 
  33. ^ "Kaspersky Lab reports a new and dangerous blackmailing virus". Kaspersky Lab. 5 June 2008. Retrieved 11 June 2008. 
  34. ^ "CryptoLocker's crimewave: A trail of millions in laundered Bitcoin". ZDNet. Retrieved 23 December 2013. 
  35. ^ a b "Encryption goof fixed in TorrentLocker file-locking malware". PC World. Retrieved 15 October 2014. 
  36. ^ "Cryptolocker 2.0 – new version, or copycat?". WeLiveSecurity. ESET. Retrieved 18 January 2014. 
  37. ^ "New CryptoLocker Spreads via Removable Drives". Trend Micro. Retrieved 18 January 2014. 
  38. ^ "Synology NAS devices targeted by hackers, demand Bitcoin ransom to decrypt files". ExtremeTech. Ziff Davis Media. Retrieved 18 August 2014. 
  39. ^ "File-encrypting ransomware starts targeting Linux web servers". PC World. IDG. Retrieved 31 May 2016. 
  40. ^ "Cybercriminals Encrypt Website Databases in "RansomWeb" Attacks". SecurityWeek. Retrieved 31 May 2016. 
  41. ^ "Hackers holding websites to ransom by switching their encryption keys". The Guardian. Retrieved 31 May 2016. 
  42. ^ "The new .LNK between spam and Locky infection". Blogs.technet.microsoft.com. Retrieved 25 October 2017. 
  43. ^ Muncaster, Phil (13 April 2016). "PowerShell Exploits Spotted in Over a Third of Attacks". 
  44. ^ "Locky Ransomware Has Evolved—The Dangers of PowerShell Scripting". Sentinelone.com. Retrieved 24 May 2017. 
  45. ^ "New ransomware employs Tor to stay hidden from security". The Guardian. Retrieved 31 May 2016. 
  46. ^ a b "The current state of ransomware: CTB-Locker". Sophos Blog. Sophos. Retrieved 31 May 2016. 
  47. ^ Brook, Chris (4 June 2015). "Author Behind Ransomware Tox Calls it Quits, Sells Platform". Retrieved 6 August 2015. 
  48. ^ Dela Paz, Roland (29 July 2015). "Encryptor RaaS: Yet another new Ransomware-as-a-Service on the Block". Archived from the original on 2 August 2015. Retrieved 6 August 2015. 
  49. ^ "Symantec classifies ransomware as the most dangerous cyber threat – Tech2". 2016-09-22. Retrieved 2016-09-22. 
  50. ^ Leyden, John. "Russian cops cuff 10 ransomware Trojan suspects". The Register. Retrieved 10 March 2012. 
  51. ^ "Criminals push ransomware hosted on GitHub and SourceForge pages by spamming 'fake nude pics' of celebrities". TheNextWeb. Retrieved 17 July 2013. 
  52. ^ "New OS X malware holds Macs for ransom, demands $300 fine to the FBI for 'viewing or distributing' porn". TheNextWeb. Retrieved 17 July 2013. 
  53. ^ "Man gets ransomware porn pop-up, goes to cops, gets arrested on child porn charges". Ars Technica. Retrieved 31 July 2013. 
  54. ^ Young, A. (2003). Non-Zero Sum Games and Survivable Malware. IEEE Systems, Man and Cybernetics Society Information Assurance Workshop. pp. 24–29. 
  55. ^ A. Young, M. Yung (2004). Malicious Cryptography: Exposing Cryptovirology. Wiley. ISBN 0-7645-4975-8. 
  56. ^ a b "Ransomware on mobile devices: knock-knock-block". Kaspersky Lab. Retrieved 6 Dec 2016. 
  57. ^ a b "Your Android phone viewed illegal porn. To unlock it, pay a $300 fine". Ars Technica. Retrieved 9 April 2017. 
  58. ^ "New Android ransomware uses clickjacking to gain admin privileges". PC World. Retrieved 9 April 2017. 
  59. ^ "Here's How to Overcome Newly Discovered iPhone Ransomware". Fortune. Retrieved 9 April 2017. 
  60. ^ "Ransomware scammers exploited Safari bug to extort porn-viewing iOS users". Ars Technica. Retrieved 9 April 2017. 
  61. ^ "Gardaí warn of 'Police Trojan' computer locking virus". TheJournal.ie. Retrieved 31 May 2016. 
  62. ^ "Barrie computer expert seeing an increase in the effects of the new ransomware". Barrie Examiner. Postmedia Network. Retrieved 31 May 2016. 
  63. ^ "Fake cop Trojan 'detects offensive materials' on PCs, demands money". The Register. Retrieved 15 August 2012. 
  64. ^ a b "Reveton Malware Freezes PCs, Demands Payment". InformationWeek. Retrieved 16 August 2012. 
  65. ^ Dunn, John E. "Police alert after ransom Trojan locks up 1,100 PCs". TechWorld. Retrieved 16 August 2012. 
  66. ^ Constantian, Lucian. "Police-themed Ransomware Starts Targeting US and Canadian Users". PC World. Retrieved 11 May 2012. 
  67. ^ "Reveton 'police ransom' malware gang head arrested in Dubai". TechWorld. Retrieved 18 October 2014. 
  68. ^ "'Reveton' ransomware upgraded with powerful password stealer". PC World. Retrieved 18 October 2014. 
  69. ^ "Disk encrypting Cryptolocker malware demands $300 to decrypt your files". Geek.com. Retrieved 12 September 2013. 
  70. ^ "CryptoLocker attacks that hold your computer to ransom". The Guardian. Retrieved 23 October 2013. 
  71. ^ "Destructive malware "CryptoLocker" on the loose – here's what to do". Naked Security. Sophos. Retrieved 23 October 2013. 
  72. ^ "CryptoLocker crooks charge 10 Bitcoins for second-chance decryption service". NetworkWorld. Retrieved 5 November 2013. 
  73. ^ "CryptoLocker creators try to extort even more money from victims with new service". PC World. Retrieved 5 November 2013. 
  74. ^ "Wham bam: Global Operation Tovar whacks CryptoLocker ransomware & GameOver Zeus botnet". Computerworld. IDG. Archived from the original on 3 July 2014. Retrieved 18 August 2014. 
  75. ^ "U.S. Leads Multi-National Action Against "Gameover Zeus" Botnet and "Cryptolocker" Ransomware, Charges Botnet Administrator". Justice.gov. U.S. Department of Justice. Retrieved 18 August 2014. 
  76. ^ "Australians increasingly hit by global tide of cryptomalware". Symantec. Retrieved 15 October 2014. 
  77. ^ Grubb, Ben (17 September 2014). "Hackers lock up thousands of Australian computers, demand ransom". Sydney Morning Herald. Retrieved 15 October 2014. 
  78. ^ "Australia specifically targeted by Cryptolocker: Symantec". ARNnet. 3 October 2014. Retrieved 15 October 2014. 
  79. ^ "Scammers use Australia Post to mask email attacks". Sydney Morning Herald. 15 October 2014. Retrieved 15 October 2014. 
  80. ^ Steve Ragan (7 October 2014). "Ransomware attack knocks TV station off air". CSO. Retrieved 15 October 2014. 
  81. ^ "Over 9,000 PCs in Australia infected by TorrentLocker ransomware". CSO.com.au. Retrieved 18 December 2014. 
  82. ^ "Malvertising campaign delivers digitally signed CryptoWall ransomware". PC World. Retrieved 25 June 2015. 
  83. ^ "CryptoWall 3.0 Ransomware Partners With FAREIT Spyware". Trend Micro. Retrieved 25 June 2015. 
  84. ^ Andra Zaharia (5 November 2015). "Security Alert: CryptoWall 4.0 – new, enhanced and more difficult to detect". HEIMDAL. Retrieved 5 January 2016. 
  85. ^ "Ransomware on mobile devices: knock-knock-block". Kaspersky Lab. Retrieved 4 Dec 2016. 
  86. ^ "The evolution of mobile ransomware". Avast. Retrieved 4 Dec 2016. 
  87. ^ "Mobile ransomware use jumps, blocking access to phones". PCWorld. IDG Consumer & SMB. Retrieved 4 Dec 2016. 
  88. ^ "Cyber-attack: Europol says it was unprecedented in scale". BBC News. 13 May 2017. Retrieved 13 May 2017. 
  89. ^ "'Unprecedented' cyberattack hits 200,000 in at least 150 countries, and the threat is escalating". CNBC. 14 May 2017. Retrieved 16 May 2017. 
  90. ^ "The real victim of ransomware: Your local corner store". CNET. Retrieved 2017-05-22. 
  91. ^ Marsh, Sarah (12 May 2017). "The NHS trusts hit by malware – full list". The Guardian. Retrieved 12 May 2017. 
  92. ^ "Honda halts Japan car plant after WannaCry virus hits computer network". Reuters. 21 June 2017. Retrieved 21 June 2017. 
  93. ^ "Ransomware virus plagues 75k computers across 99 countries". RT International. Retrieved 2017-05-12. 
  94. ^ Scott, Paul Mozur, Mark; Goel, Vindu (2017-05-19). "Victims Call Hackers' Bluff as Ransomware Deadline Nears". The New York Times. 0362-4331. Retrieved 2017-05-22. 
  95. ^ Constantin, Lucian. "Petya ransomware is now double the trouble". NetworkWorld. Retrieved 2017-06-27. 
  96. ^ "Tuesday's massive ransomware outbreak was, in fact, something much worse". Ars Technica. Retrieved 2017-06-28. 
  97. ^ "Cyber-attack was about data and not money, say experts". BBC News. 29 June 2017. Retrieved 29 June 2017. 
  98. ^ "'Bad Rabbit' ransomware strikes Ukraine and Russia". BBC. 24 October 2017. Retrieved 24 October 2017. 
  99. ^ Hern, Alex (25 October 2017). "Bad Rabbit: Game of Thrones-referencing ransomware hits Europe". Theguardian.com. Retrieved 25 October 2017. 
  100. ^ a b c Larson, Selena (25 October 2017). "New ransomware attack hits Russia and spreads around globe". CNN. Retrieved 25 October 2017. 
  101. ^ Cameron, Dell (24 October 2017). "'Bad Rabbit' Ransomware Strikes Russia and Ukraine". Gizmodo. Retrieved 24 October 2017. 
  102. ^ Palmer, Danny (24 October 2017). "Bad Rabbit ransomware: A new variant of Petya is spreading, warn researchers". ZDNet. Retrieved 24 October 2017. 
  103. ^ Fahmida Y. Rashid (April 19, 2016). "Patch JBoss now to prevent SamSam ransomware attacks". InfoWorld. IDG. Retrieved July 23, 2018. 
  104. ^ a b Crowe, Jonathan (March 2018). "City of Atlanta Hit with SamSam Ransomware: 5 Key Things to Know". Barkley vs Malware. Barkley Protects, Inc. Retrieved July 18, 2018. 
  105. ^ "SamSam ransomware attacks have earned nearly $850,000". CSO Online. IDG. March 23, 2018. Retrieved July 18, 2018. 
  106. ^ "Yuma Sun weathers malware attack". Yuma Sun. Retrieved 18 August 2014. 
  107. ^ Cannell, Joshua. "Cryptolocker Ransomware: What You Need To Know, last updated 06/02/2014". Malwarebytes Unpacked. Retrieved 19 October 2013. 
  108. ^ Leyden, Josh. "Fiendish CryptoLocker ransomware: Whatever you do, don't PAY". The Register. Retrieved 18 October 2013. 
  109. ^ "Cryptolocker Infections on the Rise; US-CERT Issues Warning". SecurityWeek. 19 November 2013. Retrieved 18 January 2014. 
  110. ^ "'Petya' Ransomware Outbreak Goes Global". krebsonsecurity.com. Krebs on Security. Retrieved 29 June 2017. 
  111. ^ "How to protect yourself from Petya malware". CNET. Retrieved 29 June 2017. 
  112. ^ "Petya ransomware attack: What you should do so that your security is not compromised". The Economic Times. 29 June 2017. Retrieved 29 June 2017. 
  113. ^ "New 'Petya' Ransomware Attack Spreads: What to Do". Tom's Guide. 27 June 2017. Retrieved 29 June 2017. 
  114. ^ "India worst hit by Petya in APAC, 7th globally: Symantec". The Economic Times. 29 June 2017. Retrieved 29 June 2017. 
  115. ^ "TRA issues advice to protect against latest ransomware Petya | The National". Retrieved 29 June 2017. 
  116. ^ "Petya Ransomware Spreading Via EternalBlue Exploit « Threat Research Blog". FireEye. Retrieved 29 June 2017. 
  117. ^ a b Chang, Yao-Chung (2012). Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait. Edward Elgar Publishing. ISBN 9780857936684. Retrieved 30 June 2017. 
  118. ^ "Infection control for your computers: Protecting against cyber crime - GP Practice Management Blog". GP Practice Management Blog. 18 May 2017. Retrieved 30 June 2017. 
  119. ^ https://theviraltopic.com/what-is-ransomware-5-ways-to-protect-your-pc-from-ransomware/
  120. ^ "Defeating CryptoLocker Attacks with ZFS". ixsystems.com. 27 August 2015. 
  121. ^ "List of free Ransomware Decryptor Tools to unlock files". Thewindowsclub.com. Retrieved 28 July 2016. 
  122. ^ "Emsisoft Decrypter for HydraCrypt and UmbreCrypt Ransomware". Thewindowsclub.com. Retrieved 28 July 2016. 
  123. ^ "Ransomware removal tools". Retrieved 19 September 2017. 
  124. ^ Logan M. Fields (25 February 2017). "The Minority Report – Week 7 – The Half-Way Point". World News. 
  125. ^ NetSec Editor (15 February 2017). "Maryland Ransomware Bill Makes Attacks Felonies". Network Security News. 
  126. ^ Wang Wei (6 June 2017). "14-Year-Old Japanese Boy Arrested for Creating Ransomware". The Hacker News. 
  127. ^ Young, Adam L.; Yung, Moti (2005). "An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API" (PDF). Cryptovirology Labs. Retrieved 16 August 2017. 
Other Languages
Afrikaans: Losprysware
العربية: رانسوم وير
भोजपुरी: रैनसमवेयर
čeština: Ransomware
dansk: Ransomware
Deutsch: Ransomware
eesti: Lunavara
Ελληνικά: Ransomware
español: Ransomware
euskara: Ransomware
français: Rançongiciel
galego: Ransomware
한국어: 랜섬웨어
हिन्दी: रैनसमवेयर
hrvatski: Ransomware
Bahasa Indonesia: Perangkat pemeras
íslenska: Gagnagíslataka
italiano: Ransomware
Basa Jawa: Ransomware
Kiswahili: Programufidia
lumbaart: Ransomware
മലയാളം: റാംസംവെയർ
Bahasa Melayu: Perisian tebusan
монгол: Ransomware
Nederlands: Ransomware
polski: Ransomware
português: Ransomware
română: Ransomware
Simple English: Ransomware
slovenčina: Ransomware
srpskohrvatski / српскохрватски: Ucjenjivački softver
svenska: Ransomware
Türkçe: Fidye virüsü
українська: Ransomware
Tiếng Việt: Mã độc tống tiền
中文: 勒索軟體