Cyber Fraud
Cyber Fraud
Cyber Fraud
net/publication/333834813
CITATIONS READS
11 2,283
1 author:
Ilker Kara
Çankırı Karatekin Üniversitesi
36 PUBLICATIONS 123 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Truva Atı Zararlı Yazılımlarının Tespit, Teknik Analiz ve Çözüm Önerileri Detection, Technical Analysis and Recommended Solutions of Trojan Horse Malware View project
TÜRKİYE’DE ZARARLI YAZILIMLARLA MÜCADELENİN UYGULAMA VE HUKUKİ BOYUTUNUN DEĞERLENDİRİLMESİ View project
All content following this page was uploaded by Ilker Kara on 14 December 2020.
Abstract—Currently as the widespread use of virtual monetary section of files and entering an appropriate code key opens the
units (like Bitcoin, Ethereum, Ripple, Litecoin) has begun, people files for access again. Crypto-ransomware is the most popular
with bad intentions have been attracted to this area and have malware observed in recent times. With the spread of virtual
produced and marketed ransomware in order to obtain virtual
currency use around the world, it has become a focus of
currency easily. This ransomware infiltrates the victim’s system
with smartly-designed methods and encrypts the files found in the interest for attackers. The convenience of virtual currencies
system. After the encryption process, the attacker leaves a and inability to trace them forms the basis of the designed
message demanding a ransom in virtual currency to open access malware. Crypto-ransomware can delete files from the victim’s
to the encrypted files and warns that otherwise the files will not system after encryption [9].
be accessible. This type of ransomware is becoming more popular
over time, so currently it is the largest information technology
When the user attempts to access the desired files, a message
security threat. In the literature, there are many studies about
detection and analysis of this cyber-bullying. In this study, we is shown on the screen stating that the files are encrypted and
focused on crypto-ransomware and investigated a forensic payment is required. After the encrypted files are deleted from
analysis of a current attack example in detail. In this example, the the victim’s system, they are stored in an area belonging to the
attack method and behavior of the crypto-ransomware were attacker and a promise is made that they will be reopened for
analyzed and it was identified that information belonging to the sharing when the ransom is paid. Investigated examples show
attacker was accessible. With this dimension, we think our study
will significantly contribute to the struggle against this threat.
that even if the ransom is paid it is nearly impossible to access
the encrypted files [10].
Index Terms—Ransomware Analysis, Crypto-Ransomware,
Cybersecurity. II. HOW IS RANSOMWARE TRANSMITTED?
0765
0766
Shaid and Maarof [17] executed ransomware within a virtual
machine environment, collected user-level API calls and
categorized.
IV. OUR PROPOSED FRAMEWORK Fig. 3. The overall process of our proposed system.
In this section, we explain our proposed architectural system. In this section, we present the necessary analysis infrastructure
In the study, the proposed approach model was designed in for the systematic approach to be used for identification and
order to implement identification and analysis of crypto- analysis of crypto-ransomware and how it is applied. A sample
ransomware specifically. Our approach comprises three case was selected for analysis in order to research applicability
modules. These are; of this approach.
0766
0767
ry Internet Files\SIFRE_COZME_TALIMATI.html location SIFRE_COZME_TALIMATI.html After the creation
included a note belonging to the attacker (Figure 4). Static procedure, the procedure was performed by reading the “.enc”
investigations of the file called command. After the “.enc” command finished encryption, the
“SIFRE_COZME_TALIMATI.html” with the “Md5deep” note to the victim during the attack was created as the file
program identified the suspicious file was created in the time called C:\Windows\Temp\SIFRE_COZME_TALIMATI.html
interval “23.05.2020 14:11:49 (2020-05-23 14:11:49 UTC)” (Figure 7).
(Figure 4).
After the attacker successfully infiltrated the system, in order
to leave no trace, records or all procedures were deleted with
the C:\Users\Admin\AppData\Roaming\Microsoft\Windows\
SIFRE_COZME_TALIMATI.html command.
Figure 7. Screen capture of some files encrypted with the suspicious “.enc”
software and located in C:\Users\Admin\AppData\Local\Microsoft\Windows\
copy”
0767
0768
to capture from the network, record online data and analyze
offline. Due to this feature of the application, it allows rapid
investigation of instantaneous network traffic. With the
thought that the investigated crypto-ransomware would attempt
to contact the attacker, all network traffic was stopped on the
Workstation before executing the Wireshark program. Later
the Wireshark program was executed and network traffic
investigated (Figure 8).
0769
0768
analysis studies are very valuable but include certain [14] A. Kharraz, S. Arshad, C. Mulliner, W. K. Robertson, and E. Kirda.
2016.Unveil: A large-scal, automated approach to detecting
limitations of the methods used. Information about detection
ransomware. In USENIX Security Symposium, pages 757-772.
and analysis of an example of a real attack is very limited. The [15] https://websitem.karatekin.edu.tr/ilkerkara/paylasimlar/dosya/0f7a100dc
most important aim of the study is to focus on this problem f5c42d2
and develop an applicable approach. [16] M. Boldt, andB. Carlsson.2006 Analysing privacy-invasive software
using computer forensic methods. ICSEA, Papeetee.
[17] S. Z. M. Shaid, and M. A. Maarof. 2014. Malware behavior image for
In this study we proposed an applicable approach comprising malware variant identification”, 2014 International Symposium on
three modules for detection and analysis of crypto- Biometrics and Security Technologies (ISBAST). IEEE, 2014.
ransomware. The applicability of this approach was [18] I. Kara. 2019. A basic malware analysis method. Computer Fraud &
investigated for a real crypto-ransomware attack. The analysis Security, 2019(6), 11-19.
[19] M. Kbanov, V. G. Vassilakis, M. D. Logothetis. 2019. WannaCry
results show the recommended approach will be useful for ransomware: Analysis of infection, persistence, recovery prevention and
detection and analysis of crypto-ransomware. It appears the propagation mechanisms. Journal of Telecommunications and
attacker could be traced from the obtained information. With Information Technology.
this aspect, it is considered that the study will contribute to [20] J. Hwang, J. Kim, S. Lee, K. Kim, K. 2020. Two-Stage Ransomware
Detection Using Dynamic Analysis and Machine Learning Techniques.
precautions taken and interventions made against crypto- Wireless Personal Communications, 112(4), 2597-2609.
ransomware.
ALL BIOS ARE REQUIRED
Conflict of Interest
Dr. Ilker KARA is a Assoc.Prof.Dr in Department
of Medical Services and Techniques, Eldivan
No conflict of interest was declared by the authors. Medical Services Vocational School, Çankırı
Karatekin University since 2019. He was a Lecturer
REFERENCES in the Computer Science & Engineering at the
University of Hacattepe where he has been a
[1] M. Egele, T.Scholte, E. Kirda, & C. Kruegel, 2008. A survey on faculty member since 2017. By Kara completed his
automated dynamic malware-analysis techniques and tools. ACM Ph.D. at Gazi University, 2015. His research
computing surveys (CSUR), 44(2), 1-42. interests lie in the area of digital investigation,
[2] D. Kim, D. Shin, D. Shin, & Y. H. Kim, 2019. Attack detection malware analysis and internet securty. He has collaborated actively with
application with attack tree for mobile system using log analysis. researchers in several other disciplines of computer science, particularly
Mobile Networks and Applications, 24(1), 184-192. forensic security. 2001. He is the Head of Information Security Division at
[3] F. L. Lévesque, S. Chiasson, A. Somayaji, & J. M. Fernandez, 2018. the Informatics Institute. Dr. Kara is the author/co-author of more than 20
Technological and human factors of malware attacks: A computer technical publications focusing on the applications of Cyber Security,
security clinical trial approach. ACM Transactions on Privacy and Malware Analysis; Data Security Mechanisms.
Security (TOPS), 21(4), 1-30.
[4] İ. Kara, M. Aydos, 2019. The ghost in the system: technical analysis of Dr. Murat AYDOS – Dr. Murat Aydos received the
remote access trojan. International Journal on Information Technologies B.Sc. degree from Yildiz Technical University
& Security, 11(1). (Turkey) in 1991, and M.S. degree from Electrical
[5] I. Kara, M. Aydos, 2018, December. Static and dynamic analysis of and Computer Engineering Department, Oklahoma
third generation cerber ransomware. In 2018 International Congress on State University
Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (USA), in 1996. He completed his Ph.D. study in
(pp. 12-17). IEEE. Oregon State University, Electrical Engineering and
[6] B. A. S. Al-rimy, M. A. Maarof, S. Z. M. Shaid, 2018. Ransomware Computer Science Department in June 2001. Dr.
threat success factors, taxonomy, and countermeasures: A survey and Aydos joined Informatics Institute @ Hacettepe
research directions. Computers & Security, 74, 144-166. University in April 2013. He is the Head of Information Security Division at
[7] S. Baek, Y. Jung, A. Mohaisen, S. Lee, D. Nyang, 2018, July. SSD- the Informatics Institute. Dr. Aydos is the author/co-author of more than 30
insider: Internal defense of solid-state drive against ransomware with technical publications focusing on the applications of Cryptographic
perfect data recovery. In 2018 IEEE 38th International Conference on Primitives, Information & Data Security Mechanisms.
Distributed Computing Systems (ICDCS) (pp. 875-884). IEEE.
[8] M. A. S. Monge, J. M. Vidal, L. J. G. Villalba, 2018, August. A novel
Self-Organizing Network solution towards Crypto-ransomware
Mitigation. In Proceedings of the 13th International Conference on
Availability, Reliability and Security (pp. 1-10).
[9] K. İlker, M. Aydos. (2019, October). Detection and Analysis of Attacks
Against Web Services by the SQL Injection Method. In 2019 3rd
International Symposium on Multidisciplinary Studies and Innovative
Technologies (ISMSIT) (pp. 1-4). IEEE.on Electronic Crime Research
(eCrime) (pp. 1-13). IEEE.
[10] S. Mohurle, M. Patil, 2017. A brief study of wannacry threat:
Ransomware attack 2017. International Journal of Advanced Research
in Computer Science, 8(5).
[11] F. Karbalaie, A. Sami, and M. Ahmadi. 2012.Semantic malware
detection by deploying graph mining. International Journal of Computer
Science Issues,9(1):373-379.
[12] D. Sgandurra, L. Munoz-Gonz_alez, R. Mohsen, and E. C. Lupu. 2016.
Automated dynamic analysis of ransomware: Bene_ts, limitations and
use for detection. arXiv preprint arXiv:1609.03020.
[13] D. Kim and S. Kim. 2015. Design of quanti-cation model for ransom
ware prevent. World Journal of Engineering and Technology, 3(03):203.
0769
0770