Data in digital form is considered one of the
most valuable assets. Digital data may pertain to
financial transactions, trade secrets and national security
matters. The threat of data theft and inaccessibility of
important resources has always existed. Therefore,
various protections were used since earlier days of
computation. The protection may be physically locking
the computer room or different options available for
encryption and password protection, thus restricting
number of users beyond designated persons. In recent
past the emphasis has been growing on connecting digital
asset to various networks and internet resources for
updates and quick operational requirements. Releasing
certain resources for public use is unavoidable for
smooth functioning of business. Emails, downloads,
remote access has become a way of life. Thus, in current
scenario no protection can be called full proof and
attackers find one or more vulnerabilities in system. One
of the most preferable methods of such cyber attack is to
hold owner of digital assets as hostage using ransomware.
This intrusive software can quickly make changes to the
system and restrict user access so that owner of the
system is unable to access the data. Warnings may be
flashed on the system to demand money in exchange of
renewed access. Ransomware have recently claimed a
place of prominence in computer security.
Keywords :
Ransomware, Wannacry, Cryptoworm, Indicators of Compromise.