Cryptolocking Technology

Authors : Poli Sivasankar Rao , Malidevaraju Siva Sankar Raju.

Volume/Issue : Volume 2 - 2017, Issue 6 - June

Google Scholar :

Scribd :

Thomson Reuters ResearcherID :

Attackers have developed a way to monetize files already on a victim’s computer. They accomplish this through en crypting select files and then charging for access to the key.\ This type of malware has spawned a new classification, cryptoransomware, but is more commonly known by the name of most prevalent version, Crypto Locker, or its variants TeslaCrypt and CryptoWall. This article will discuss how it works, how it happens, and most importantly what enterprises can do to protect themselves above and beyond IDS/IPS and antivirus systems. Prescriptive guidance for ba-sic prevention, detection, mitigation, and recovery controls is offered.

Keywords : Antivirus; Cryptoransomware; CryptoWal; TeslaCrypt; IDS/IPS; Malware;


Paper Submission Last Date
30 - November - 2022

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.