Computer Virus Rapid Research (One-Pager)
Cybersecurity and Crime One-Pager Template
<change this to your title> |
Note: All text in Italics, including this text, is intended to be replaced by your responses, and deleted once you’ve completed your one-pager.
Overview
When did the event happen?
Whose data was lost / stolen / leaked? How many people / organizations were affected?
Provide any other context necessary to understand the “big picture” of the event.
The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred on the internet from 5 September 2013 to late May 2014. The attack utilized a trojan that affected computers running Microsoft Windows. It propagated via infected email attachments, when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography and then takes that private key back to their servers. [1] By then, your data is unable to decrypted without the malware’s private key which is most likely in their servers. all The malware then displays a message which offers to decrypt the data if a payment (either asking for bitcoin or a pre-paid cash voucher) is made by a stated deadline, and it will threaten to delete the private key if the deadline passes. If the deadline is wasn’t fulfilled, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin. However, there is no guarantee that payment will release the encrypted content. The malware was eventually controlled and isolated by Operation Tovar which halted its distribution of the malware.
How and How to Prevent
What specific type of attack / mistake led to the data falling into the wrong hands? Reference terms in “How Not to Get Hacked” where applicable. What types of cybersecurity techniques might be used to help prevent this from happening again?
The biggest mistake in people having their data fall in the wrong hands is when they download files off the internet without any prior knowledge or proper caution. The main technique to help prevent this is that you should always know what you click on. Be observant at unknown emails sending you things or strangers asking for personal information. Without proper observation, you could be downloading a virus that would record your personal information. Malware can hide in common examples such as pictures and emails.
Data Specifics
What specific data was stolen? Try to avoid vague terms like “financial data” and instead find the specific pieces of information like “credit card numbers”. Specific answers here will strengthen your explanation in the next section.
There was no specific data that was stolen since the hackers only wanted money to release the files back to the victim. However, CryptoLocker malware would target files that had extensions to other sources of data such as hard drives, servers, etc. [2]
Data Privacy / Security / Storage Concern
What specific concerns arise from this data being used in unintended ways or by unintended people? Is there already evidence of the data being used in these ways? Cite sources if you can find specific news stories.
If CryptoLocker malware targeted data tied to other networks, issues could arise such as an entire corporation being hacked by CryptoLocker if only one computer got compromised at the start. Another example would be having all my hard drives backed up with important data being encrypted because my computer was connected to them when I was hacked. It makes CryptoLocker easy to sneak through as it can come through anyway and spread if there is any more sources of data connected. One news story is when Dell SecureWorks last September was compromised by this malware. It encrypted multiple files that had specific file extensions, and only decrypted them once a ransom of $300 had been paid. [3]
Sources
List all websites that you used to find any information you wrote here. Include the permanent URL. Identify the author, title, source, the date you retrieved the source, and, if possible, the date the reference was written or posted. You should number your sources, here is a template you can follow:
[2] Jarvis, Keith. “CryptoLocker Ransomware Threat Analysis.” Secureworks, www.secureworks.com/research/cryptolocker-ransomware. 1/16/18
[3] Cawley, Christian, et al. “CryptoLocker Is Dead: Here's How You Can Get Your Files Back!” MakeUseOf, 14 Aug. 2014, www.makeuseof.com/tag/cryptolocker-dead-heres-can-get-files-back/. 1/16/18
Conduct Your Research
You already have some practice finding good resources online. You’ll want to find recently published documents from authoritative sources. There is no need to use overly technical documents, but keep an eye out for familiar terminology and topics.
Key Information to Find
- Overview: Whose data was stolen? When did this happen? Briefly explain the context of the event.
- Data Specifics: What specific data fell into the wrong hands?
- How was it stolen / How to Prevent: How specifically was the data stolen? Is this a flaw in the technology? Were there any cybersecurity measures in place? How might this type of attack be prevented in the future?
- Data Privacy / Security Concerns: What specific concerns arise from this data being stolen? Is there already evidence of the data being used in concerning ways? Try to find how the privacy or security of some people were compromised.
Use the tables below to keep track of your information; you can also add more if you like. You’ll need to include at least 3 sources of information but you can use more.
My Cybercrime Event: Computer Viruses (CryptoLocker leak of 2014)
Reference Name: Cybersecurity: Strategies and Techniques
Year Published: 2013
| ||
Key Information
|
Reference Name: CryptoLocker Is Dead: Here’s How You Can Get Your Files Back!
Year Published: August 14th, 2014
| ||
Key Information
|
Reference Name:
CryptoLocker Ransomware
Year Published: December 13rd, 2013
| ||
Key Information
|
i really like this website makes life more easy
ReplyDelete